메뉴 건너뛰기




Volumn 1976, Issue , 2000, Pages 143-161

Efficient secure multi-party computation

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; SECURITY OF DATA;

EID: 35248861868     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44448-3_12     Document Type: Conference Paper
Times cited : (82)

References (33)
  • 2
    • 84933507780 scopus 로고
    • Efficient multiparty protocols using circuit randomization
    • D. Beaver. Efficient multiparty protocols using circuit randomization. In Advances in Cryptology — CRYPTO ’91, vol. 576 of LNCS, pp. 420–432, 1991.
    • (1991) Advances in Cryptology — CRYPTO ’91 , vol.576 , pp. 420-432
    • Beaver, D.1
  • 3
    • 33746365751 scopus 로고
    • Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
    • D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology, pp. 75–122, 1991.
    • (1991) Journal of Cryptology , pp. 75-122
    • Beaver, D.1
  • 5
    • 0024770143 scopus 로고
    • Towards optimal distributed consensus (Extended abstract)
    • Expanded version: Bit optimal distributed consensus. In Computer Science Research, 1992
    • P. Berman, J. A. Garay, and K. J. Perry. Towards optimal distributed consensus (extended abstract). In Proc. 21st IEEE Symposium on the Foundations of Computer Science (FOCS), pp. 410–415, 1989. Expanded version: Bit optimal distributed consensus. In Computer Science Research, 1992.
    • (1989) Proc. 21St IEEE Symposium on the Foundations of Computer Science (FOCS) , pp. 410-415
    • Berman, P.1    Garay, J.A.2    Perry, K.J.3
  • 8
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multi-party cryptographic protocols
    • R. Canetti. Security and composition of multi-party cryptographic protocols. Journal of Cryptology, 13(1):143–202, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 9
    • 84898947315 scopus 로고
    • C. Cr´epeau, and I. Damg˚ard. Multiparty unconditionally secure protocols (extended abstract)
    • D. Chaum, C. Cr´epeau, and I. Damg˚ard. Multiparty unconditionally secure protocols (extended abstract). In Proc. 20th ACM Symposium on the Theory of Computing (STOC), pp. 11–19, 1988.
    • (1988) Proc. 20Th ACM Symposium on the Theory of Computing (STOC) , pp. 11-19
    • Chaum, D.1
  • 10
    • 84957717648 scopus 로고    scopus 로고
    • I. Damg˚ard, S. Dziembowski, M. Hirt, and T. Rabin. Efficient multiparty computations secure against an adaptive adversary
    • R. Cramer, I. Damg˚ard, S. Dziembowski, M. Hirt, and T. Rabin. Efficient multiparty computations secure against an adaptive adversary. In Advances in Cryptology — EUROCRYPT ’99, vol. 1592 of LNCS, p p. 311–326, 1999.
    • (1999) Advances in Cryptology — EUROCRYPT ’99, Vol. 1592 of LNCS , pp. 311-326
    • Cramer, R.1
  • 11
    • 84948975649 scopus 로고    scopus 로고
    • I. Damg˚ard, and U. Maurer. General secure multi-party computation from any linear secret sharing scheme
    • R. Cramer, I. Damg˚ard, and U. Maurer. General secure multi-party computation from any linear secret sharing scheme. In Advances in Cryptology — EUROCRYPT ’00, vol. 1807 of LNCS, pp. 316–334, 2000.
    • (2000) Advances in Cryptology — EUROCRYPT ’00, Vol. 1807 of LNCS , pp. 316-334
    • Cramer, R.1
  • 15
    • 0024942275 scopus 로고
    • Modular construction of nearly optimal Byzantine agreement protocols
    • Expanded version: Modular construction of a Byzantine agreement protocol with optimal message bit complexity. In Information and Computation, 97(1):61- 85, 1992
    • B. A. Coan and J. L. Welch. Modular construction of nearly optimal Byzantine agreement protocols. In Proc. 8th ACM Symposium on Principles of Distributed Computing (PODC), pp. 295–305, 1989. Expanded version: Modular construction of a Byzantine agreement protocol with optimal message bit complexity. In Information and Computation, 97(1):61- 85, 1992.
    • (1989) Proc. 8Th ACM Symposium on Principles of Distributed Computing (PODC) , pp. 295-305
    • Coan, B.A.1    Welch, J.L.2
  • 16
  • 17
    • 0021976090 scopus 로고
    • Bounds on information exchange for Byzantine agreement
    • D. Dolev and R. Reischuk. Bounds on information exchange for Byzantine agreement. Journal of the ACM, 32(1):191–204, 1985.
    • (1985) Journal of the ACM , vol.32 , Issue.1 , pp. 191-204
    • Dolev, D.1    Reischuk, R.2
  • 18
    • 0020289693 scopus 로고
    • Eventual is earlier than ‘Immediate’
    • 1982. Final version: Early Stopping in Byzantine Agreement. In Journal of the ACM, October
    • D. Dolev, R. Reischuk, and H. R. Strong. ‘Eventual’ is earlier than ‘Immediate’. In Proc. 23rd IEEE Symposium on the Foundations of Computer Science (FOCS), pp. 196–203, 1982. Final version: Early Stopping in Byzantine Agreement. In Journal of the ACM, 37(4):720-741, October 1990.
    • (1990) Proc. 23Rd IEEE Symposium on the Foundations of Computer Science (FOCS) , vol.37 , Issue.4 , pp. 196-203
    • Dolev, D.1    Reischuk, R.2    Strong, H.R.3
  • 20
    • 84894281582 scopus 로고
    • Optimal algorithms for Byzantine agreement
    • Expanded version in SIAM Journal on Computing, 873–933, August
    • P. Feldman and S. Micali. Optimal algorithms for Byzantine agreement. In Proc. 20th ACM Symposium on the Theory of Computing (STOC), pp. 148–161, 1988. Expanded version in SIAM Journal on Computing 26(4):873–933, August 1997.
    • (1988) Proc. 20Th ACM Symposium on the Theory of Computing (STOC) , vol.26 , Issue.4 , pp. 148-161
    • Feldman, P.1    Micali, S.2
  • 22
    • 84976655650 scopus 로고
    • Cryptographic computation: Secure faulttolerant protocols and the public-key model
    • Springer-Verlag
    • Z. Galil, S. Haber, and M. Yung. Cryptographic computation: Secure faulttolerant protocols and the public-key model. In Advances in Cryptology — CRYPTO ’87, vol. 293 of LNCS, pp. 135–155. Springer-Verlag, 1987.
    • (1987) Advances in Cryptology — CRYPTO ’87, Vol. 293 of LNCS , pp. 135-155
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 25
    • 0012575111 scopus 로고
    • Message-optimal protocols for byzantine agreement
    • 309–324, 1991. Final version in Mathematical Systems Theory, October
    • V. Hadzilacos and J. Y. Halpern. Message-optimal protocols for byzantine agreement. In Proc. 10th ACM Symposium on Principles of Distributed Computing (PODC), pp. 309–324, 1991. Final version in Mathematical Systems Theory, 26:41-102, October 1993.
    • (1993) Proc. 10Th ACM Symposium on Principles of Distributed Computing (PODC) , vol.26 , pp. 41-102
    • Hadzilacos, V.1    Halpern, J.Y.2
  • 26
    • 33745999816 scopus 로고    scopus 로고
    • Player simulation and general adversary structures in perfect multiparty computation
    • Extended abstract in Proc. 16th of ACM PODC ’97
    • M. Hirt and U. Maurer. Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology, 13(1):31–60, 2000. Extended abstract in Proc. 16th of ACM PODC ’97.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 31-60
    • Hirt, M.1    Maurer, U.2
  • 27
    • 84974655726 scopus 로고
    • Secure computation: The information theoretic case. Manuscript, 1998. Former version: Secure computation
    • Springer-Verlag
    • S. Micali and P. Rogaway. Secure computation: The information theoretic case. Manuscript, 1998. Former version: Secure computation, In Ad vances in Cryptology — CRYPTO ’91, volume 576 of LNCS, pp. 392–404, Springer-Verlag, 1991.
    • (1991) Ad Vances in Cryptology — CRYPTO ’91, Volume 576 of LNCS , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 30
    • 84976810569 scopus 로고
    • Reaching agreement in the presence of faults
    • M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. Journal of the ACM, 27(2):228–234, 1980.
    • (1980) Journal of the ACM , vol.27 , Issue.2 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 32


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.