메뉴 건너뛰기




Volumn 3152, Issue , 2004, Pages 335-354

Round-optimal secure two-party computation

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 35048822047     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-28628-8_21     Document Type: Article
Times cited : (110)

References (43)
  • 2
    • 0036949106 scopus 로고    scopus 로고
    • Constant-Round Coin-Tossing with a Man-in-the-Middle or Realizing the Shared Random String Model
    • IEEE
    • B. Barak. Constant-Round Coin-Tossing with a Man-in-the-Middle or Realizing the Shared Random String Model. 43rd IEEE Symposium on Foundations of Computer Science (FOCS), IEEE, pp. 345-355, 2002.
    • (2002) 43rd IEEE Symposium on Foundations of Computer Science (FOCS) , pp. 345-355
    • Barak, B.1
  • 4
    • 0024940038 scopus 로고
    • Non-Cryptographic Fault-Tolerant Computing in Constant Number of Rounds of Interaction
    • ACM
    • J. Bar-Ilan and D. Beaver. Non-Cryptographic Fault-Tolerant Computing in Constant Number of Rounds of Interaction. Principles of Distributed Computing, ACM, pp. 201-209, 1989.
    • (1989) Principles of Distributed Computing , pp. 201-209
    • Bar-Ilan, J.1    Beaver, D.2
  • 8
    • 0003030602 scopus 로고
    • Coin Flipping by Phone
    • M. Blum. Coin Flipping by Phone. IEEE COMPCOM, pp. 133-137, 1982.
    • (1982) IEEE COMPCOM , pp. 133-137
    • Blum, M.1
  • 9
    • 0000731055 scopus 로고    scopus 로고
    • Security and Composition of Multi-Party Cryptographic Protocols
    • R. Canetti. Security and Composition of Multi-Party Cryptographic Protocols. J. Cryptology 13(1): 143-202, 2000.
    • (2000) J. Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 10
    • 0036038991 scopus 로고    scopus 로고
    • Universally composable two-party and multi-party secure computation
    • R. Canetti, Y. Lindell, R. Ostrovsky, A. Sahai. Universally composable two-party and multi-party secure computation. STOC 2002: 494-503
    • STOC 2002 , pp. 494-503
    • Canetti, R.1    Lindell, Y.2    Ostrovsky, R.3    Sahai, A.4
  • 14
    • 84880872502 scopus 로고    scopus 로고
    • Secure Distributed Linear Algebra in a Constant Number of Rounds
    • Adv. in Cryptology - Crypto '01, Springer-Verlag
    • R. Cramer and I. Damgård. Secure Distributed Linear Algebra in a Constant Number of Rounds. Adv. in Cryptology - Crypto '01, LNCS 2139, Springer-Verlag, pp. 119-136, 2001.
    • (2001) LNCS , vol.2139 , pp. 119-136
    • Cramer, R.1    Damgård, I.2
  • 15
    • 84957093995 scopus 로고    scopus 로고
    • On Concurrent Zero-Knowledge with Preprocessing
    • G. Di Crescenzo and R. Ostrovsky. On Concurrent Zero-Knowledge with Preprocessing. In CRYPTO 1999: pp. 485-502.
    • CRYPTO 1999 , pp. 485-502
    • Di Crescenzo, G.1    Ostrovsky, R.2
  • 16
    • 84974602942 scopus 로고    scopus 로고
    • Improved Non-Committing Encryption Schemes
    • Adv. in Cryptology - Crypto 2000, Springer-Verlag
    • I. Damgård and J.B. Nielsen. Improved Non-Committing Encryption Schemes. Adv. in Cryptology - Crypto 2000, LNCS vol. 1880, Springer-Verlag, pp. 432-450, 2000.
    • (2000) LNCS , vol.1880 , pp. 432-450
    • Damgård, I.1    Nielsen, J.B.2
  • 19
    • 84976826800 scopus 로고
    • Zero Knowledge Proofs of Knowledge in Two Rounds
    • Adv. in Cryptology - Crypto 1989, Springer-Verlag
    • U. Feige and A. Shamir. Zero Knowledge Proofs of Knowledge in Two Rounds. Adv. in Cryptology - Crypto 1989, LNCS vol. 435, Springer-Verlag, pp. 526-544, 1989.
    • (1989) LNCS , vol.435 , pp. 526-544
    • Feige, U.1    Shamir, A.2
  • 21
    • 84880899701 scopus 로고    scopus 로고
    • Minimal Complete Primitives for Secure Multi-party Computation
    • M. Fitzi, J. Garay, U. Maurer, R. Ostrovsky: Minimal Complete Primitives for Secure Multi-party Computation. CRYPTO 2001: 80-100
    • CRYPTO 2001 , pp. 80-100
    • Fitzi, M.1    Garay, J.2    Maurer, U.3    Ostrovsky, R.4
  • 23
    • 84937440738 scopus 로고    scopus 로고
    • On 2-Round Secure Multiparty Computation
    • Adv. in Cryptology - Crypto 2002, Springer-Verlag
    • R. Gennaro, Y. Ishai, E. Kushilevitz, and T. Rabin. On 2-Round Secure Multiparty Computation. Adv. in Cryptology - Crypto 2002, LNCS vol. 2442, Springer-Verlag, pp. 178-193, 2002.
    • (2002) LNCS , vol.2442 , pp. 178-193
    • Gennaro, R.1    Ishai, Y.2    Kushilevitz, E.3    Rabin, T.4
  • 27
    • 0000108216 scopus 로고    scopus 로고
    • How to Construct Constant-Round Zero-Knowledge Proof Systems for NP
    • O. Goldreich and A. Kalian. How to Construct Constant-Round Zero-Knowledge Proof Systems for NP. J. Cryptology 9(3): 167-190, 1996.
    • (1996) J. Cryptology , vol.9 , Issue.3 , pp. 167-190
    • Goldreich, O.1    Kalian, A.2
  • 28
    • 0029767165 scopus 로고    scopus 로고
    • On the Composition of Zero-Knowledge Proof Systems
    • O. Goldreich and H. Krawczyk. On the Composition of Zero-Knowledge Proof Systems. SIAM J. Computing 25(1): 169-192, 1996.
    • (1996) SIAM J. Computing , vol.25 , Issue.1 , pp. 169-192
    • Goldreich, O.1    Krawczyk, H.2
  • 31
    • 0033725451 scopus 로고    scopus 로고
    • Reducibility and Completeness in Private Computations
    • J.. Kilian, E. Kushilevitz, S. Micali, R. Ostrovsky: Reducibility and Completeness in Private Computations. SIAM J. Comput. 29(4): 1189-1208 (2000)
    • (2000) SIAM J. Comput. , vol.29 , Issue.4 , pp. 1189-1208
    • Kilian, J.1    Kushilevitz, E.2    Micali, S.3    Ostrovsky, R.4
  • 32
    • 0034507841 scopus 로고    scopus 로고
    • Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation
    • IEEE
    • Y. Ishai and E. Kushilevitz. Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation. 41st IEEE Symposium on Foundations of Computer Science (FOCS), IEEE, pp. 294-304, 2000.
    • (2000) 41st IEEE Symposium on Foundations of Computer Science (FOCS) , pp. 294-304
    • Ishai, Y.1    Kushilevitz, E.2
  • 33
    • 33749018100 scopus 로고    scopus 로고
    • Round Efficiency of Multi-Party Computation with a Dishonest Majority
    • Adv. in Cryptology - Eurocrypt 2003, Springer-Verlag
    • J. Katz, R. Ostrovsky, and A. Smith. Round Efficiency of Multi-Party Computation with a Dishonest Majority. Adv. in Cryptology - Eurocrypt 2003, LNCS vol. 2656, Springer-Verlag, pp. 578-595, 2003.
    • (2003) LNCS , vol.2656 , pp. 578-595
    • Katz, J.1    Ostrovsky, R.2    Smith, A.3
  • 34
    • 0242442471 scopus 로고    scopus 로고
    • Amortizing Randomness in Private Multiparty Computations
    • E. Kushilevitz, R. Ostrovsky, A. Rosén: Amortizing Randomness in Private Multiparty Computations. SIAM J. Discrete Math. 16(4): 533-544 (2003)
    • (2003) SIAM J. Discrete Math. , vol.16 , Issue.4 , pp. 533-544
    • Kushilevitz, E.1    Ostrovsky, R.2    Rosén, A.3
  • 36
    • 85030317201 scopus 로고
    • Publicly-Verifiable Non-Interactive Zero-Knowledge Proofs
    • Adv. in Cryptology - Crypto 1990, Springer-Verlag
    • D. Lapidot and A. Shamir. Publicly-Verifiable Non-Interactive Zero-Knowledge Proofs. Adv. in Cryptology - Crypto 1990, LNCS vol. 537, Springer-Verlag, pp. 353-365, 1991.
    • (1991) LNCS , vol.537 , pp. 353-365
    • Lapidot, D.1    Shamir, A.2
  • 37
    • 35048833033 scopus 로고    scopus 로고
    • Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
    • Adv. in Cryptology - Crypto 2001, Springer-Verlag
    • Y. Lindell. Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. Adv. in Cryptology - Crypto 2001, LNCS vol. 2139, Springer-Verlag, pp. 171-189, 2001.
    • (2001) LNCS , vol.2139 , pp. 171-189
    • Lindell, Y.1
  • 38
    • 35048881915 scopus 로고    scopus 로고
    • Personal communication
    • Y. Lindell. Personal communication, 2001.
    • (2001)
    • Lindell, Y.1
  • 39
    • 84974655726 scopus 로고
    • Secure Computation
    • Adv. in Cryptology - Crypto 1991, Springer-Verlag
    • S. Micali and P. Rogaway. Secure Computation. Adv. in Cryptology - Crypto 1991, LNCS vol. 576, Springer-Verlag, pp. 392-404, 1991.
    • (1991) LNCS , vol.576 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 40
    • 84958615425 scopus 로고    scopus 로고
    • Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions
    • M. Naor, R. Ostrovsky, R. Venkatesan, M.Yung. Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions. CRYPTO 1992: 196-214
    • CRYPTO 1992 , pp. 196-214
    • Naor, M.1    Ostrovsky, R.2    Venkatesan, R.3    Yung, M.4
  • 42
    • 84957621865 scopus 로고    scopus 로고
    • On the Concurrent Composition of Zero-Knowledge Proofs
    • Adv. in Cryptology - Eurocrypt 1999, Springer-Verlag
    • R. Richardson and J. Kilian. On the Concurrent Composition of Zero-Knowledge Proofs. Adv. in Cryptology - Eurocrypt 1999, LNCS vol. 1592, Springer-Verlag, pp. 415-431, 1999.
    • (1999) LNCS , vol.1592 , pp. 415-431
    • Richardson, R.1    Kilian, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.