메뉴 건너뛰기




Volumn 2656, Issue , 2003, Pages 68-86

On the limitations of universally composable two-party computation without set-up assumptions

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 35248854495     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-39200-9_5     Document Type: Article
Times cited : (96)

References (28)
  • 1
    • 33746365751 scopus 로고
    • Secure Multi-party Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority
    • D. Beaver. Secure Multi-party Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority. Journal of Cryptology, 4(2):75-122, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.2 , pp. 75-122
    • Beaver, D.1
  • 2
    • 0029702971 scopus 로고    scopus 로고
    • Adaptive Zero-Knowledge and Computational Equivocation
    • D. Beaver. Adaptive Zero-Knowledge and Computational Equivocation. In 28th STOC, pages 629-638, 1996.
    • (1996) 28th STOC , pp. 629-638
    • Beaver, D.1
  • 3
    • 84957064831 scopus 로고    scopus 로고
    • The All-or-Nothing Nature of Two-Party Secure Computation
    • CRYPTO'99, Springer-Verlag
    • A. Beimel, T. Malkin and S. Micali. The All-or-Nothing Nature of Two-Party Secure Computation. In CRYPTO'99, Springer-Verlag (LNCS 1666), pages 80-97, 1999.
    • (1999) LNCS , vol.1666 , pp. 80-97
    • Beimel, A.1    Malkin, T.2    Micali, S.3
  • 4
    • 84898960610 scopus 로고
    • Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
    • M. Ben-Or, S. Goldwasser and A. Wigderson. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In 20th STOC, pages 1-10, 1988.
    • (1988) 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 5
    • 0035163054 scopus 로고    scopus 로고
    • Universally Composable Security: A New Paradigm for Cryptographic Protocols
    • Full version
    • R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 42nd FOCS, pages 136-145, 2001. Full version available at http://eprint.iacr.org/2000/067.
    • (2001) 42nd FOCS , pp. 136-145
    • Canetti, R.1
  • 6
    • 0029723583 scopus 로고    scopus 로고
    • Adaptively Secure Multi-Party Computation
    • R. Canetti, U. Feige, O. Goldreich and M. Naor. Adaptively Secure Multi-Party Computation. In 28th STOC, pages 639-648, 1996.
    • (1996) 28th STOC , pp. 639-648
    • Canetti, R.1    Feige, U.2    Goldreich, O.3    Naor, M.4
  • 7
    • 84880897758 scopus 로고    scopus 로고
    • Universally Composable Commitments
    • CRYPTO 2001, Springer-Verlag
    • R. Canetti and M. Fischlin. Universally Composable Commitments. In CRYPTO 2001, Springer-Verlag (LNCS 2139), pages 19-40, 2001.
    • (2001) LNCS , vol.2139 , pp. 19-40
    • Canetti, R.1    Fischlin, M.2
  • 8
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of Key Exchange Protocols and Their Use for Building Secure Channels
    • Eurocrypt 2001, Springer-Verlag
    • R. Canetti and H. Krawczyk. Analysis of Key Exchange Protocols and Their Use for Building Secure Channels. In Eurocrypt 2001, Springer-Verlag (LNCS 2045), pages 453-474, 2001.
    • (2001) LNCS , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 9
    • 84947232363 scopus 로고    scopus 로고
    • Universally composable key exchange and secure channels
    • Eurocrypt 2002, Springer-Verlag
    • R. Canetti and H. Krawczyk. Universally composable key exchange and secure channels. In Eurocrypt 2002, Springer-Verlag (LNCS 2332), pages 337-351, 2002.
    • (2002) LNCS , vol.2332 , pp. 337-351
    • Canetti, R.1    Krawczyk, H.2
  • 10
    • 35248850473 scopus 로고    scopus 로고
    • On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions (full version)
    • R. Canetti, E. Kushilevitz and Y. Lindell. On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions (full version). Cryptology ePrint Archive, http://eprint.iacr.org/, 2003.
    • (2003) Cryptology ePrint Archive
    • Canetti, R.1    Kushilevitz, E.2    Lindell, Y.3
  • 11
    • 0036038991 scopus 로고    scopus 로고
    • Universally Composable Two-Party and Multi-Party Computation
    • R. Canetti, Y. Lindell, R. Ostrovsky and A. Sahai. Universally Composable Two-Party and Multi-Party Computation. In 34th STOC, pages 494-503, 2002.
    • (2002) 34th STOC , pp. 494-503
    • Canetti, R.1    Lindell, Y.2    Ostrovsky, R.3    Sahai, A.4
  • 12
    • 0024860209 scopus 로고
    • A Zero-One Law for Boolean Privacy
    • B. Chor, and E. Kushilevitz. A Zero-One Law for Boolean Privacy. In 21st STOC, pages 62-72, 1989.
    • (1989) 21st STOC , pp. 62-72
    • Chor, B.1    Kushilevitz, E.2
  • 13
    • 0012610677 scopus 로고
    • Limits on the security of coin-flips when half the processors are faulty
    • R. Cleve. Limits on the security of coin-flips when half the processors are faulty. In 18th STOC, pages 364-369, 1986.
    • (1986) 18th STOC , pp. 364-369
    • Cleve, R.1
  • 15
    • 0031632567 scopus 로고    scopus 로고
    • Concurrent Zero-Knowledge
    • C. Dwork, M. Naor, and A. Sahai. Concurrent Zero-Knowledge. In 30th STOC, pages 409-418, 1998.
    • (1998) 30th STOC , pp. 409-418
    • Dwork, C.1    Naor, M.2    Sahai, A.3
  • 16
    • 0034510467 scopus 로고    scopus 로고
    • Concurrent Oblivious Transfer
    • J. Garay and P. Mackenzie. Concurrent Oblivious Transfer. In 41st FOCS, pages 314-324, 2000.
    • (2000) 41st FOCS , pp. 314-324
    • Garay, J.1    Mackenzie, P.2
  • 17
    • 0029767165 scopus 로고    scopus 로고
    • On the composition of zero-knowledge proof systems
    • O. Goldreich and H. Krawczyk. On the composition of zero-knowledge proof systems. SIAM Journal of Computing, 25(1):169-192, 1996.
    • (1996) SIAM Journal of Computing , vol.25 , Issue.1 , pp. 169-192
    • Goldreich, O.1    Krawczyk, H.2
  • 18
    • 0023545076 scopus 로고
    • How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority
    • O. Goldreich, S. Micali and A. Wigderson. How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In 19th STOC, pages 218-229, 1987.
    • (1987) 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 19
    • 84955564077 scopus 로고
    • Fair Computation of General Functions in Presence of Immoral Majority
    • CRYPTO'90, Springer-Verlag
    • S. Goldwasser and L. Levin. Fair Computation of General Functions in Presence of Immoral Majority. In CRYPTO'90, Springer-Verlag (LNCS 537), pages 77-93, 1990.
    • (1990) LNCS , vol.537 , pp. 77-93
    • Goldwasser, S.1    Levin, L.2
  • 20
  • 21
    • 0033725451 scopus 로고    scopus 로고
    • Reducibility and Completeness in Private Computations
    • J. Kilian, E. Kushilevitz, S. Micali, and R. Ostrovsky. Reducibility and Completeness in Private Computations. SICOMP, 29(4):1189-1208, 2000.
    • (2000) SICOMP , vol.29 , Issue.4 , pp. 1189-1208
    • Kilian, J.1    Kushilevitz, E.2    Micali, S.3    Ostrovsky, R.4
  • 22
    • 0033706604 scopus 로고    scopus 로고
    • More general completeness theorems for secure two-party computation
    • J. Kilian. More general completeness theorems for secure two-party computation. In 32nd STOC, pages 316-324, 2000.
    • (2000) 32nd STOC , pp. 316-324
    • Kilian, J.1
  • 23
    • 0024768184 scopus 로고
    • Privacy and Communication Complexity
    • E. Kushilevitz. Privacy and Communication Complexity. In 30th FOCS, pages 416-421, 1989.
    • (1989) 30th FOCS , pp. 416-421
    • Kushilevitz, E.1
  • 24
    • 84974655726 scopus 로고
    • Secure computation
    • Unpublished manuscript, 1992. Preliminary version in CRYPTO'91, Springer-Verlag
    • S. Micali and P. Rogaway. Secure computation. Unpublished manuscript, 1992. Preliminary version in CRYPTO'91, Springer-Verlag (LNCS 576), pages 392-404, 1991.
    • (1991) LNCS , vol.576 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 25
    • 0024983231 scopus 로고
    • Public key cryptosystems provably secure against chosen ciphertext attacks
    • M. Naor and M. Yung. Public key cryptosystems provably secure against chosen ciphertext attacks. In 22nd STOC, 427-437, 1990.
    • (1990) 22nd STOC , pp. 427-437
    • Naor, M.1    Yung, M.2
  • 26
    • 0024859552 scopus 로고
    • Verifiable Secret Sharing and Multi-party Protocols with Honest Majority
    • T. Rabin and M. Ben-Or. Verifiable Secret Sharing and Multi-party Protocols with Honest Majority. In 21st STOC, pages 73-85, 1989.
    • (1989) 21st STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 27
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • CRYPTO'91, Springer-Verlag
    • C. Rackoff and D. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In CRYPTO'91, Springer-Verlag (LNCS 576), pages 433-444, 1991.
    • (1991) LNCS , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.2
  • 28
    • 84957621865 scopus 로고    scopus 로고
    • On the Concurrent Composition of Zero-Knowledge Proofs
    • Eurocrypt'99, Springer-Verlag
    • R. Richardson and J. Kilian. On the Concurrent Composition of Zero-Knowledge Proofs. In Eurocrypt'99, Springer-Verlag (LNCS 1592), pages 415-431, 1999.
    • (1999) LNCS , vol.1592 , pp. 415-431
    • Richardson, R.1    Kilian, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.