메뉴 건너뛰기




Volumn 4116 LNCS, Issue , 2006, Pages 18-33

Universally composable simultaneous Broadcast

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; INTERACTIVE COMPUTER SYSTEMS; NETWORK PROTOCOLS; PARALLEL PROCESSING SYSTEMS; SECURITY OF DATA;

EID: 33750001509     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11832072_2     Document Type: Conference Paper
Times cited : (4)

References (36)
  • 1
    • 33646833311 scopus 로고    scopus 로고
    • Adaptively secure feldman VSS and applications to universally-composable threshold cryptography
    • LNCS 3152, Springer-Verlag
    • M. Abe and S. Fehr. Adaptively secure feldman VSS and applications to universally-composable threshold cryptography. In Advances in Cryptology CRYPTO, LNCS 3152, pages 317-334. Springer-Verlag, 2004.
    • (2004) Advances in Cryptology CRYPTO , pp. 317-334
    • Abe, M.1    Fehr, S.2
  • 2
    • 33749582730 scopus 로고    scopus 로고
    • Protocol initialization for the framework of universal composability
    • B. Barak, Y. Lindell, and T. Rabin. Protocol initialization for the framework of universal composability. Cryptology ePrint Archive, Report 2004/006, 2004. http://eprint.iacr.org/.
    • (2004) Cryptology EPrint Archive, Report , vol.2004 , Issue.6
    • Barak, B.1    Lindell, Y.2    Rabin, T.3
  • 3
    • 0027188428 scopus 로고
    • Asynchronous secure computation
    • ACM Press
    • M. Ben-Or, R. Canetti, and O. Goldreich. Asynchronous secure computation. In ACM STOC'93, pages 52-61. ACM Press, 1993.
    • (1993) ACM STOC'93 , pp. 52-61
    • Ben-Or, M.1    Canetti, R.2    Goldreich, O.3
  • 4
    • 0346342609 scopus 로고    scopus 로고
    • Resilient-optimal interactive consistency in constant time
    • M. Ben-Or and R. El-Yaniv. Resilient-optimal interactive consistency in constant time. Distributed Computing, 16(4):249-262, 2003.
    • (2003) Distributed Computing , vol.16 , Issue.4 , pp. 249-262
    • Ben-Or, M.1    El-Yaniv, R.2
  • 5
    • 84898960610 scopus 로고
    • Completeness theorems for noncryptographic fault-tolerant distributed computations
    • ACM Press
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic fault-tolerant distributed computations. In ACM STOC'88, pages 1-10. ACM Press, 1988.
    • (1988) ACM STOC'88 , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 6
    • 85008184918 scopus 로고
    • Asynchronous secure computations with optimal resilience
    • M. Ben-Or, B. Kelmer, and T. Rabin. Asynchronous secure computations with optimal resilience (extended abstract). In ACM PODC'94, pages 183-192, 1994.
    • (1994) ACM PODC'94 , pp. 183-192
    • Ben-Or, M.1    Kelmer, B.2    Rabin, T.3
  • 7
    • 84880899710 scopus 로고    scopus 로고
    • Secure and efficient asynchronous broadcast protocols
    • LNCS 2139 Springer-Verlag
    • C. Cachin, K. Kursawe, F. Petzold, and V. Shoup. Secure and efficient asynchronous broadcast protocols. In Advances in Cryptology - CRYPTO, LNCS 2139, pages 524-541. Springer-Verlag, 2001.
    • (2001) Advances in Cryptology - CRYPTO , pp. 524-541
    • Cachin, C.1    Kursawe, K.2    Petzold, F.3    Shoup, V.4
  • 8
    • 28144462281 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Report 2000/067, Cryptology ePrint Archive, January
    • R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. Report 2000/067, Cryptology ePrint Archive, January 2005. Full version of that in IEEE Symposium on Foundations of Computer Science (FOGS'01).
    • (2005) IEEE Symposium on Foundations of Computer Science (FOGS'01)
    • Canetti, R.1
  • 10
    • 0038721038 scopus 로고    scopus 로고
    • Universally composable twoparty and multi-party secure computation
    • R. Canetti, Y. Lindell, R. Ostrovsky, and A. Sahai. Universally composable twoparty and multi-party secure computation. In ACM STOC'02, 2002.
    • (2002) ACM STOC'02
    • Canetti, R.1    Lindell, Y.2    Ostrovsky, R.3    Sahai, A.4
  • 11
    • 0027313816 scopus 로고
    • Fast asynchronous Byzantine agreement with optimal resilience
    • ACM Press
    • R. Canetti and T. Rabin. Fast asynchronous Byzantine agreement with optimal resilience (extended abstract). In ACM STOC'93, pages 42-51. ACM Press, 1993.
    • (1993) ACM STOC'93 , pp. 42-51
    • Canetti, R.1    Rabin, T.2
  • 15
    • 35248844164 scopus 로고    scopus 로고
    • Universally composable efficient multiparty computation from threshold homomorphic encryption
    • LNCS 2729, Springer-Verlag
    • I. Damgård and J. B. Nielsen. Universally composable efficient multiparty computation from threshold homomorphic encryption. In Advances in Cryptology -CRYPTO, LNCS 2729, pages 247-264. Springer-Verlag, 2003.
    • (2003) Advances in Cryptology - CRYPTO , pp. 247-264
    • Damgård, I.1    Nielsen, J.B.2
  • 16
    • 84974602942 scopus 로고    scopus 로고
    • Improved non-committing encryption schemes based on a general complexity assumption
    • LNCS 1880, Springer-Verlag
    • I. Damgård and J.B. Nielsen. Improved non-committing encryption schemes based on a general complexity assumption. In Advances in Cryptology - CRYPTO, LNCS 1880, pages 432-450. Springer-Verlag, 2000.
    • (2000) Advances in Cryptology - CRYPTO , pp. 432-450
    • Damgård, I.1    Nielsen, J.B.2
  • 18
    • 0031210863 scopus 로고    scopus 로고
    • An optimal probabilistic protocol for synchronous byzantine agreement
    • P. Feldman and S. Micali. An optimal probabilistic protocol for synchronous byzantine agreement. SIAM Journal on Computing, 26(4):873-933, 1997.
    • (1997) SIAM Journal on Computing , vol.26 , Issue.4 , pp. 873-933
    • Feldman, P.1    Micali, S.2
  • 19
  • 20
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
    • July
    • O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. Journal of the ACM, 38(3):691-729, July 1991.
    • (1991) Journal of the ACM , vol.38 , Issue.3 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 22
    • 32344443727 scopus 로고    scopus 로고
    • Simultaneous broadcast revisited
    • ACM Press
    • A. Hevia and D. Micciancio. Simultaneous broadcast revisited. In ACM PODC'05, pages 324-333. ACM Press, 2005.
    • (2005) ACM PODC'05 , pp. 324-333
    • Hevia, A.1    Micciancio, D.2
  • 23
    • 24944494113 scopus 로고    scopus 로고
    • Cryptographic asynchronous multiparty computation with optimal resilience
    • LNCS 3494,. Springer-Verlag
    • M. Hirt, J. B. Nielsen, and B. Przydatek. Cryptographic asynchronous multiparty computation with optimal resilience (extended abstract). In Advances in Cryptology - EUROCRYPT'05, LNCS 3494, pages 322-340. Springer-Verlag, 2005.
    • (2005) Advances in Cryptology - EUROCRYPT'05 , pp. 322-340
    • Hirt, M.1    Nielsen, J.B.2    Przydatek, B.3
  • 26
    • 0036038649 scopus 로고    scopus 로고
    • On the composition of authenticated byzantine agreement
    • ACM Press
    • Y. Lindell, A. Lysyanskaya, and T. Rabin. On the composition of authenticated byzantine agreement. In ACM STOC'02, pages 514-523. ACM Press, 2002.
    • (2002) ACM STOC'02 , pp. 514-523
    • Lindell, Y.1    Lysyanskaya, A.2    Rabin, T.3
  • 27
    • 0036957660 scopus 로고    scopus 로고
    • Sequential composition of protocols without simultaneous termination
    • Y. Lindell, A. Lysyanskaya, and T. Rabin. Sequential composition of protocols without simultaneous termination. In ACM PODC'02, pages 203-212, 2002.
    • (2002) ACM PODC'02 , pp. 203-212
    • Lindell, Y.1    Lysyanskaya, A.2    Rabin, T.3
  • 29
    • 0348228510 scopus 로고
    • Collective coin tossing without assumptions nor broadcasting
    • LNCS 537
    • S. Micali and T. Rabin. Collective coin tossing without assumptions nor broadcasting. In Advances in Cryptology - CRYPTO, LNCS 537, pages 253-266, 1990.
    • (1990) Advances in Cryptology - CRYPTO , pp. 253-266
    • Micali, S.1    Rabin, T.2
  • 31
    • 84976810569 scopus 로고
    • Reaching agreements in the presence of faults
    • April
    • M. Pease, R. Shostak, and L. Lamport. Reaching agreements in the presence of faults. Journal of the ACM, 27(2):228-234, April 1980.
    • (1980) Journal of the ACM , vol.27 , Issue.2 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 32
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • IEEE CS
    • B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In IEEE Symposium on Security and Privacy (S&P-01), pages 184-201. IEEE CS, 2001.
    • (2001) IEEE Symposium on Security and Privacy (S&P-01) , pp. 184-201
    • Pfitzmann, B.1    Waidner, M.2
  • 33
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • ACM Press
    • T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In ACM STOC'89, pages 73-85. ACM Press, 1989.
    • (1989) ACM STOC'89 , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.