메뉴 건너뛰기




Volumn 2951, Issue , 2004, Pages 238-257

A quantitative approach to reductions in secure computation

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; INFORMATION THEORY;

EID: 35048856983     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24638-1_14     Document Type: Article
Times cited : (19)

References (25)
  • 1
    • 0003619771 scopus 로고
    • Perfect privacy for two-party protocols
    • Computer Science, Harvard University
    • D. Beaver. Perfect privacy for two-party protocols. Technical Report TR-11-89, Computer Science, Harvard University, 1989.
    • (1989) Technical Report , vol.TR-11-89
    • Beaver, D.1
  • 2
    • 0029702967 scopus 로고    scopus 로고
    • Correlated pseudorandomness and the complexity of private computations
    • D. Beaver. Correlated pseudorandomness and the complexity of private computations. In the 28th Symp. on the Theory of Computing, pages 479-488, 1996.
    • (1996) 28th Symp. on the Theory of Computing , pp. 479-488
    • Beaver, D.1
  • 3
    • 84957064831 scopus 로고    scopus 로고
    • The all-or-nothing nature of two-party secure computation
    • CRYPTO '99, Springer
    • A. Beimel, T. Malkin, and S. Micali. The all-or-nothing nature of two-party secure computation. In CRYPTO '99, volume 1666 of LNCS, pages 80-97. Springer, 1999.
    • (1999) LNCS , vol.1666 , pp. 80-97
    • Beimel, A.1    Malkin, T.2    Micali, S.3
  • 4
    • 84898960610 scopus 로고
    • Completeness theorems for noncryptographic fault-tolerant distributed computations
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic fault-tolerant distributed computations. In the 20th Symp. on the Theory of Computing, pages 1-10, 1988.
    • (1988) 20th Symp. on the Theory of Computing , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 5
    • 84957360961 scopus 로고    scopus 로고
    • Oblivious transfers and privacy amplification
    • EUROCRYPT '97, Springer
    • G. Brassard and C. Crepeau. Oblivious transfers and privacy amplification. In EUROCRYPT '97, volume 1233 of LNCS, pages 334-347. Springer, 1997.
    • (1997) LNCS , vol.1233 , pp. 334-347
    • Brassard, G.1    Crepeau, C.2
  • 8
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti. Security and composition of multiparty cryptographic protocols. J. of Cryptology, 13(1):143-202, 2000.
    • (2000) J. of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 11
    • 85030121757 scopus 로고
    • Equivalence between two flavors of oblivious transfers
    • CRYPTO '87, Springer
    • C. Crépeau. Equivalence between two flavors of oblivious transfers. In CRYPTO '87, volume 293 of LNCS, pages 350-354. Springer, 1988.
    • (1988) LNCS , vol.293 , pp. 350-354
    • Crépeau, C.1
  • 12
  • 13
    • 84957697395 scopus 로고    scopus 로고
    • On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
    • EUROCRYPT '99, . Springer
    • I. Damgard, J. Kilian, and L. Salvail. On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions. In EUROCRYPT '99, volume.1592 of LNCS, pages 56-73. Springer, 1999.
    • (1999) LNCS , vol.1592 , pp. 56-73
    • Damgard, I.1    Kilian, J.2    Salvail, L.3
  • 14
    • 84957611040 scopus 로고    scopus 로고
    • Lower bounds for oblivious transfer reductions
    • EUROCRYPT '99
    • Y. Dodis and S. Micali. Lower bounds for oblivious transfer reductions. In EUROCRYPT '99, volume 1592 of LNCS, pages 42-55, 1999.
    • (1999) LNCS , vol.1592 , pp. 42-55
    • Dodis, Y.1    Micali, S.2
  • 15
    • 0034858470 scopus 로고    scopus 로고
    • A linear lower bound on the unbounded error probabilistic communication complexity
    • J. Forster. A linear lower bound on the unbounded error probabilistic communication complexity. In 16th Conf. on Comput. Complexity, pp. 100-106, 2001.
    • (2001) 16th Conf. on Comput. Complexity , pp. 100-106
    • Forster, J.1
  • 16
    • 85032194875 scopus 로고
    • How to solve any protocol problem-an efficiency improvement
    • CRYPTO '87, Springer
    • O. Goldreich and R. Vainish. How to solve any protocol problem-an efficiency improvement. In CRYPTO '87, vol. 293 of LNCS, pages 73-86. Springer, 1988.
    • (1988) LNCS , vol.293 , pp. 73-86
    • Goldreich, O.1    Vainish, R.2
  • 17
    • 24144457853 scopus 로고    scopus 로고
    • Extending oblivious transfers efficiently
    • CRYPTO 2003, Springer
    • Y. Ishai, J. Kilian, K. Nissim, and E. Petrank. Extending oblivious transfers efficiently. In CRYPTO 2003, volume 2729 of LNCS, pages 145-161, Springer, 2003.
    • (2003) LNCS , vol.2729 , pp. 145-161
    • Ishai, Y.1    Kilian, J.2    Nissim, K.3    Petrank, E.4
  • 22
    • 0002365530 scopus 로고
    • Privacy and communication complexity
    • E. Kushilevitz. Privacy and communication complexity. SIAM J. on Discrete Mathematics, 5(2):273-284, 1992.
    • (1992) SIAM J. on Discrete Mathematics , vol.5 , Issue.2 , pp. 273-284
    • Kushilevitz, E.1
  • 24
    • 84957050617 scopus 로고    scopus 로고
    • Information-theoretic cryptography
    • CRYPTO '99, Springer
    • U. Maurer. Information-theoretic cryptography. In CRYPTO '99, volume 1666 of LNCS, pages 47-64. Springer, 1999.
    • (1999) LNCS , vol.1666 , pp. 47-64
    • Maurer, U.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.