메뉴 건너뛰기




Volumn 2656, Issue , 2003, Pages 87-105

Fair secure two-party computation: Extended abstract

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTERS;

EID: 35248883427     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-39200-9_6     Document Type: Article
Times cited : (84)

References (30)
  • 2
    • 0024769014 scopus 로고
    • Multiparty computation with faulty majority
    • D. Beaver and S. Goldwasser, Multiparty computation with faulty majority, Proc. 30th FOCS, pp. 468-473, 1989.
    • (1989) Proc. 30th FOCS , pp. 468-473
    • Beaver, D.1    Goldwasser, S.2
  • 6
    • 84976804419 scopus 로고
    • How to exchange (secret) keys
    • May
    • M. Blum, How to exchange (secret) keys, ACM Transactions on Computer Systems, 1(2):175-193, May 1983.
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.2 , pp. 175-193
    • Blum, M.1
  • 7
    • 0022716288 scopus 로고
    • A Simple Unpredictable Pseudo-Random Number Generator
    • May
    • L. Blum, M. Blum, and M. Shub, A Simple Unpredictable Pseudo-Random Number Generator, SIAM Journal on Computing, Vol. 15, pp. 364-383, May 1986.
    • (1986) SIAM Journal on Computing , vol.15 , pp. 364-383
    • Blum, L.1    Blum, M.2    Shub, M.3
  • 8
    • 84974588386 scopus 로고    scopus 로고
    • Timed commitments
    • Advances in Cryptology - Crypto '2000
    • D. Boneh and M. Naor, Timed commitments, Advances in Cryptology - Crypto '2000, Springer-Verlag LNCS 1880, 236-254, 2000.
    • (2000) Springer-Verlag LNCS , vol.1880 , pp. 236-254
    • Boneh, D.1    Naor, M.2
  • 9
    • 0035879575 scopus 로고    scopus 로고
    • A Fair and Efficient Solution to the Socialist Millionaires' Problem
    • July
    • F. Boudot, B. Schoenmakers and J. Traore, A Fair and Efficient Solution to the Socialist Millionaires' Problem, Discrete App. Math. 111, pp. 23-36, July 2001.
    • (2001) Discrete App. Math. , vol.111 , pp. 23-36
    • Boudot, F.1    Schoenmakers, B.2    Traore, J.3
  • 11
    • 1142307279 scopus 로고    scopus 로고
    • Optimistic fair secure computation
    • Advances in Cryptology - Crypto '2000
    • C. Cachin and J. Camenish, Optimistic fair secure computation, Advances in Cryptology - Crypto '2000, Springer-Verlag LNCS 1880, 94-112, 2000.
    • (2000) Springer-Verlag LNCS , vol.1880 , pp. 94-112
    • Cachin, C.1    Camenish, J.2
  • 12
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • D. Chaum, Blind signatures for untraceable payments, Advances in Cryptology - Crypto '82, pp. 199-203, 1982.
    • (1982) Advances in Cryptology - Crypto '82 , pp. 199-203
    • Chaum, D.1
  • 14
    • 0012610677 scopus 로고
    • Limits on the security of coin flips when half the processors are faulty
    • R. Cleve, Limits on the security of coin flips when half the processors are faulty, STOC '86, 364-369, 1986.
    • (1986) STOC '86 , pp. 364-369
    • Cleve, R.1
  • 15
    • 85032862578 scopus 로고
    • Controlled gradual disclosure schemes for random bits and their applications
    • Adv. in Crypt. - Crypto '89
    • R. Cleve, Controlled gradual disclosure schemes for random bits and their applications, Adv. in Crypt. - Crypto '89, Springer-Verlag, LNCS 435, 573-588, 1990.
    • (1990) Springer-Verlag, LNCS , vol.435 , pp. 573-588
    • Cleve, R.1
  • 16
    • 85016672373 scopus 로고
    • Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
    • Advances in Cryptology - Crypto '94
    • R. Cramer, I. Damgard and B. Schoenmakers, Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols, Advances in Cryptology - Crypto '94, Springer Verlag LNCS, vol. 839, pp. 174-187, 1994.
    • (1994) Springer Verlag LNCS , vol.839 , pp. 174-187
    • Cramer, R.1    Damgard, I.2    Schoenmakers, B.3
  • 17
    • 0029362450 scopus 로고
    • Practical and provably secure release of a secret and exchange of signatures
    • I. Damgard, Practical and provably secure release of a secret and exchange of signatures, J. Cryptology, 8(4):201-222, 1995.
    • (1995) J. Cryptology , vol.8 , Issue.4 , pp. 201-222
    • Damgard, I.1
  • 18
    • 0001126172 scopus 로고
    • Pricing via processing, or combatting junk email
    • Springer-Verlag
    • C. Dwork and M. Naor, Pricing via processing, or combatting junk email, Advances in Cryptology - Crypto '92, Springer-Verlag, 139-147, 1990.
    • (1990) Advances in Cryptology - Crypto '92 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 20
    • 84976655650 scopus 로고
    • Cryptographic Computation: Secure Fault-tolerant Protocols and the Public-Key Model
    • Advances in Cryptology - Crypto '87
    • Z. Galil, S. Haber and M. Yung, Cryptographic Computation: Secure Fault-tolerant Protocols and the Public-Key Model, Advances in Cryptology - Crypto '87, Springer-Verlag LNCS 293, 135-155, 1988.
    • (1988) Springer-Verlag LNCS , vol.293 , pp. 135-155
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 24
    • 84955564077 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • Adv. in Crypt. - Crypto '90
    • S. Goldwasser and L. Levin, Fair computation of general functions in presence of immoral majority, Adv. in Crypt. - Crypto '90, Springer-Verlag LNCS 537, 1991.
    • (1991) Springer-Verlag LNCS , vol.537
    • Goldwasser, S.1    Levin, L.2
  • 25
    • 4243127426 scopus 로고
    • How to simultaneously exchange secret bit by flipping a symmetrically-biased coin
    • M. Luby, S. Micali and C. Rackoff, How to simultaneously exchange secret bit by flipping a symmetrically-biased coin, Proceedings of FOCS '83, 23-30, 1983.
    • (1983) Proceedings of FOCS '83 , pp. 23-30
    • Luby, M.1    Micali, S.2    Rackoff, C.3
  • 26
    • 84949193057 scopus 로고    scopus 로고
    • Timed-Release Cryptography
    • Selected Areas in Cryptography VIII (SAC '01)
    • W. Mao, Timed-Release Cryptography, Selected Areas in Cryptography VIII (SAC '01), Springer-Verlag LNCS 2259, pp. 342-357, 2001.
    • (2001) Springer-Verlag LNCS , vol.2259 , pp. 342-357
    • Mao, W.1
  • 27
    • 43149113579 scopus 로고    scopus 로고
    • Secure protocols with invisible trusted parties
    • Weizmann Inst. of Science, June
    • S. Micali, Secure protocols with invisible trusted parties, presented at the Workshop for Multi-Party Secure Protocols, Weizmann Inst. of Science, June 1998.
    • (1998) Workshop for Multi-Party Secure Protocols
    • Micali, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.