메뉴 건너뛰기




Volumn , Issue , 2007, Pages 11-20

On achieving the "best of both worlds" in secure multiparty computation

Author keywords

Secure computation

Indexed keywords

MULTI PARTY COMPUTATION; SECURE COMPUTATION;

EID: 35448952561     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1250790.1250793     Document Type: Conference Paper
Times cited : (63)

References (27)
  • 1
    • 0005260647 scopus 로고    scopus 로고
    • Multiparty Protocols Tolerating Half Faulty Processors
    • D. Beaver. Multiparty Protocols Tolerating Half Faulty Processors. Crypto '89.
    • Crypto '89
    • Beaver, D.1
  • 2
    • 35448983095 scopus 로고    scopus 로고
    • D. Beaver and S. Goldwasser. Multiparty Computation with Faulty Majority. FOCS '89.
    • D. Beaver and S. Goldwasser. Multiparty Computation with Faulty Majority. FOCS '89.
  • 3
    • 35448955649 scopus 로고    scopus 로고
    • D. Beaver, S. Micali, and P. Rogaway. The Round Complexity of Secure Protocols. STOC '90.
    • D. Beaver, S. Micali, and P. Rogaway. The Round Complexity of Secure Protocols. STOC '90.
  • 4
    • 35448993254 scopus 로고    scopus 로고
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. STOC '88.
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. STOC '88.
  • 5
    • 35448992440 scopus 로고    scopus 로고
    • D. Boneh and M. Naor. Timed Commitments. Crypto 2000.
    • D. Boneh and M. Naor. Timed Commitments. Crypto 2000.
  • 6
    • 0000731055 scopus 로고    scopus 로고
    • Security and Composition of Multiparty Cryptographic Protocols
    • R. Canetti. Security and Composition of Multiparty Cryptographic Protocols. J. Cryptology 13(1): 143-202, 2000.
    • (2000) J. Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 7
    • 84858358886 scopus 로고    scopus 로고
    • D. Chaum, C. Crépeau, and I. Damgàrd. Multiparty Unconditionally-Secure Protocols. STOC '88.
    • D. Chaum, C. Crépeau, and I. Damgàrd. Multiparty Unconditionally-Secure Protocols. STOC '88.
  • 8
    • 35448989719 scopus 로고    scopus 로고
    • R. Cleve. Limits on the Security of Coin Flips when Half the Processors are Faulty. STOC '86.
    • R. Cleve. Limits on the Security of Coin Flips when Half the Processors are Faulty. STOC '86.
  • 9
    • 35448987255 scopus 로고    scopus 로고
    • Controlled Gradual Disclosure Schemes for Random Bits and Their Applications
    • R. Cleve. Controlled Gradual Disclosure Schemes for Random Bits and Their Applications. Crypto '89.
    • Crypto '89
    • Cleve, R.1
  • 10
    • 0022080529 scopus 로고
    • A Randomized Protocol for Signing Contracts
    • S. Even, O. Goldreich, and A. Lempel. A Randomized Protocol for Signing Contracts. Comm. ACM 28(6): 637-647, 1985.
    • (1985) Comm. ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 11
    • 35448969275 scopus 로고    scopus 로고
    • Trading Correctness for Privacy in Unconditional Multiparty Computation
    • M. Fitzi, M. Hirt, and U. Maurer. Trading Correctness for Privacy in Unconditional Multiparty Computation. Crypto '98.
    • Crypto '98
    • Fitzi, M.1    Hirt, M.2    Maurer, U.3
  • 15
    • 33645593031 scopus 로고    scopus 로고
    • Foundations of Cryptography
    • Cambridge University Press
    • O. Goldreich. Foundations of Cryptography, vol. 2: Basic Applications. Cambridge University Press, 2004.
    • (2004) Basic Applications , vol.2
    • Goldreich, O.1
  • 16
    • 35448933585 scopus 로고    scopus 로고
    • O. Goldreich, S. Micali, and A. Wigderson. How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. STOC '87.
    • O. Goldreich, S. Micali, and A. Wigderson. How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. STOC '87.
  • 17
    • 0012527958 scopus 로고    scopus 로고
    • Fair Computation of General Functions in Presence of Immoral Majority
    • S. Goldwasser and L. Levin. Fair Computation of General Functions in Presence of Immoral Majority. Crypto '90.
    • Crypto '90
    • Goldwasser, S.1    Levin, L.2
  • 18
    • 22344432877 scopus 로고    scopus 로고
    • Secure Multiparty Computation without Agreement
    • S. Goldwasser and Y. Lindell. Secure Multiparty Computation without Agreement. J. Cryptology 18(3): 247-287, 2005.
    • (2005) J. Cryptology , vol.18 , Issue.3 , pp. 247-287
    • Goldwasser, S.1    Lindell, Y.2
  • 19
    • 33749547215 scopus 로고    scopus 로고
    • Y. Ishai, E. Kushilevitz, Y. Lindell, and E. Petrank. On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation. Crypto 2006.
    • Y. Ishai, E. Kushilevitz, Y. Lindell, and E. Petrank. On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation. Crypto 2006.
  • 21
    • 33745130227 scopus 로고    scopus 로고
    • Round Efficiency of Multi-Party Computation with a Dishonest Majority
    • J. Katz, R. Ostrovsky, and A. Smith. Round Efficiency of Multi-Party Computation with a Dishonest Majority. Eurocrypt 2003.
    • (2003) Eurocrypt
    • Katz, J.1    Ostrovsky, R.2    Smith, A.3
  • 22
    • 35448956053 scopus 로고    scopus 로고
    • M. Luby, S. Micali, and C. Rackoff. How to Simultaneously Exchange a Secret Bit by Flipping a Symmetrically-Biased Coin. FOCS '83.
    • M. Luby, S. Micali, and C. Rackoff. How to Simultaneously Exchange a Secret Bit by Flipping a Symmetrically-Biased Coin. FOCS '83.
  • 24
    • 38049154921 scopus 로고    scopus 로고
    • Fair Secure Two-Party Computation
    • B. Pinkas. Fair Secure Two-Party Computation. Eurocrypt 2003.
    • (2003) Eurocrypt
    • Pinkas, B.1
  • 25
    • 35448976824 scopus 로고    scopus 로고
    • T. Rabin and M. Ben-Or. Verifiable Secret Sharing and Multiparty Protocols with Honest Majority. STOC '89.
    • T. Rabin and M. Ben-Or. Verifiable Secret Sharing and Multiparty Protocols with Honest Majority. STOC '89.
  • 26
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir. How to Share a Secret. Comm. ACM 22(6):612-613, 1979.
    • (1979) Comm. ACM , vol.22 , Issue.6 , pp. 612-613
    • Shamir, A.1
  • 27
    • 35448940438 scopus 로고    scopus 로고
    • A. Yao. How to Generate and Exchange Secrets. FOCS '86.
    • A. Yao. How to Generate and Exchange Secrets. FOCS '86.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.