메뉴 건너뛰기




Volumn 2729, Issue , 2003, Pages 265-281

Universal composition with joint state

Author keywords

Cryptographic protocols; Protocol composition; Security analysis

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; PUBLIC KEY CRYPTOGRAPHY; RANDOM PROCESSES;

EID: 35248819315     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45146-4_16     Document Type: Article
Times cited : (136)

References (25)
  • 1
    • 33746365751 scopus 로고
    • Secure Multiparty Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority
    • D. Beaver. Secure Multiparty Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority. Journal of Cryptology, 4:75-122, 1991.
    • (1991) Journal of Cryptology , vol.4 , pp. 75-122
    • Beaver, D.1
  • 2
    • 84898960610 scopus 로고
    • Completeness Theorems for Noncryptographic Fault-Tolerant Distributed Computations
    • ACM
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness Theorems for Noncryptographic Fault-Tolerant Distributed Computations. In Proc. 20th STOC, pages 1-10. ACM, 1988.
    • (1988) Proc. 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 3
    • 0003030602 scopus 로고
    • Coin Flipping by Telephone
    • M. Blum. Coin Flipping by Telephone. In IEEE Spring COMPCOM, pages 133-137, 1982.
    • (1982) IEEE Spring COMPCOM , pp. 133-137
    • Blum, M.1
  • 4
    • 84945119254 scopus 로고
    • Entity Authentication and Key Distribution
    • Crypto '93
    • M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. In Crypto '93, pages 232-249, 1993. LNCS No. 773.
    • (1993) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 0000731055 scopus 로고    scopus 로고
    • Security and Composition of Multiparty Cryptographic Protocols
    • R. Canetti. Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology, 13(1):143-202, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 6
    • 0035163054 scopus 로고    scopus 로고
    • Universally Composable Security: A New Paradigm for Cryptographic Protocols
    • IEEE
    • R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In Proc. 42st FOCS, pages 136-145. IEEE, 2001. http://eprint.iacr.org/2000/067.
    • (2001) Proc. 42st FOCS , pp. 136-145
    • Canetti, R.1
  • 7
    • 84880897758 scopus 로고    scopus 로고
    • Universally Composable Commitments
    • Crypto '01
    • R. Canetti and M. Fischlin. Universally Composable Commitments. In Crypto '01, pages 19-40. LNCS No. 2139.
    • LNCS , vol.2139 , pp. 19-40
    • Canetti, R.1    Fischlin, M.2
  • 8
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
    • Eurocrypt '01
    • R. Canetti and H. Krawczyk. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels . In Eurocrypt '01, pages 453-474, 2001. LNCS No. 2045.
    • (2001) LNCS , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 9
    • 84947232363 scopus 로고    scopus 로고
    • Universally Composable Key Exchange and Secure Channels
    • Eurocrypt '02
    • R. Canetti and H. Krawczyk. Universally Composable Key Exchange and Secure Channels. In Eurocrypt '02, pages 337-351, 2002. LNCS No. 2332.
    • (2002) LNCS , vol.2332 , pp. 337-351
    • Canetti, R.1    Krawczyk, H.2
  • 10
    • 0036038991 scopus 로고    scopus 로고
    • Universally Composable Two-Party and Multi-Party Secure Computation
    • R. Canetti, Y. Lindell, R. Ostrovsky, and A. Sahai. Universally Composable Two-Party and Multi-Party Secure Computation. In Proc. 34th STOC, pages 494-503.
    • Proc. 34th STOC , pp. 494-503
    • Canetti, R.1    Lindell, Y.2    Ostrovsky, R.3    Sahai, A.4
  • 13
    • 0343337504 scopus 로고    scopus 로고
    • Non-malleable Cryptography
    • D. Dolev, C. Dwork, and M. Naor. Non-malleable Cryptography. SIAM J. Comput., 30(2):391-437, 2000.
    • (2000) SIAM J. Comput. , vol.30 , Issue.2 , pp. 391-437
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 14
    • 84974597111 scopus 로고    scopus 로고
    • Parallel Reducibility for Information-Theoretically Secure Computation
    • Crypto '00
    • Y. Dodis and S. Micali. Parallel Reducibility for Information-Theoretically Secure Computation. In Crypto '00, pages 74-92, 2000. LNCS No. 1880.
    • (2000) LNCS , vol.1880 , pp. 74-92
    • Dodis, Y.1    Micali, S.2
  • 15
    • 84943237732 scopus 로고    scopus 로고
    • Universally Composable Commitment Schemes with Constant Expansion Factor
    • Crypto '02
    • I. Damgard and J. Nielsen. Universally Composable Commitment Schemes with Constant Expansion Factor. In Crypto '02 LNCS No. 2442.
    • LNCS , vol.2442
    • Damgard, I.1    Nielsen, J.2
  • 17
    • 0029767165 scopus 로고    scopus 로고
    • On the composition of zero-knowledge proof systems
    • O. Goldreich and H. Krawczyk. On the composition of zero-knowledge proof systems. SIAM. J. Computing, 25(1):169-192, 1996.
    • (1996) SIAM. J. Computing , vol.25 , Issue.1 , pp. 169-192
    • Goldreich, O.1    Krawczyk, H.2
  • 18
    • 84955564077 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • Crypto '90
    • S. Goldwasser and L. Levin. Fair computation of general functions in presence of immoral majority. In Crypto '90, 1990. LNCS No. 537.
    • (1990) LNCS , vol.537
    • Goldwasser, S.1    Levin, L.2
  • 20
    • 0028676264 scopus 로고
    • Definitions and Properties of Zero-Knowledge Proof Systems
    • Preliminary version by Y. Oren in FOCS87
    • O. Goldreich and Y. Oren. Definitions and Properties of Zero-Knowledge Proof Systems. Journal of Cryptology, 7(1):1-32, 1994. Preliminary version by Y. Oren in FOCS87.
    • (1994) Journal of Cryptology , vol.7 , Issue.1 , pp. 1-32
    • Goldreich, O.1    Oren, Y.2
  • 21
    • 84943296297 scopus 로고    scopus 로고
    • Concurrent Zero-Knowledge with Timing Revisited
    • O. Goldreich. Concurrent Zero-Knowledge With Timing Revisited. In Proc. 34th STOC.
    • Proc. 34th STOC
    • Goldreich, O.1
  • 22
    • 85088886366 scopus 로고    scopus 로고
    • On the Composition of Authenticated Byzantine Agreement
    • Y. Lindell, A. Lysyanskya, and T. Rabin. On the Composition of Authenticated Byzantine Agreement. In Proc. 34th STOC, pages 514-523.
    • Proc. 34th STOC , pp. 514-523
    • Lindell, Y.1    Lysyanskya, A.2    Rabin, T.3
  • 23
    • 84974655726 scopus 로고
    • Secure Computation
    • Manuscript available
    • S. Micali and P. Rogaway. Secure Computation. In Crypto '91, pages 392-404, 1991. Manuscript available.
    • (1991) Crypto '91 , pp. 392-404
    • Micali, S.1    Rogaway, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.