메뉴 건너뛰기




Volumn 4521 LNCS, Issue , 2007, Pages 207-225

A new protocol for conditional disclosure of secrets and its applications

Author keywords

Conditional disclosure of secrets; Crypto computing; Homomorphic encryption; Oblivious transfer; Two party computation

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY; QUERY PROCESSING; SERVERS; TELECOMMUNICATION NETWORKS; VERIFICATION;

EID: 38049016843     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-72738-5_14     Document Type: Conference Paper
Times cited : (23)

References (27)
  • 1
    • 84945134014 scopus 로고    scopus 로고
    • Priced Oblivious Transfer: How to Sell Digital Goods
    • Advances in Cryptology, EUROCRYPT 2001, of, Springer-Verlag
    • William Aiello, Yuval Ishai, and Orner Reingold. Priced Oblivious Transfer: How to Sell Digital Goods. In Advances in Cryptology - EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, 2001. Springer-Verlag.
    • (2001) Lecture Notes in Computer Science , vol.2045
    • Aiello, W.1    Ishai, Y.2    Reingold, O.3
  • 2
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF Formulas on Ciphertexts
    • The Second Theory of Cryptography Conference, TCC 2005, of, Springer Verlag
    • Dan Boneh, Eu-Jin Goh, and Kobbi Nissim. Evaluating 2-DNF Formulas on Ciphertexts. In The Second Theory of Cryptography Conference, TCC 2005, volume 3378 of Lecture Notes in Computer Science, 2005. Springer Verlag.
    • (2005) Lecture Notes in Computer Science , vol.3378
    • Boneh, D.1    Goh, E.2    Nissim, K.3
  • 3
    • 35048846561 scopus 로고    scopus 로고
    • Strong Conditional Oblivious Transfer and Computing on Intervals
    • Advances on Cryptology, ASIACRYPT 2004, of, Springer-Verlag
    • Ian F. Blake and Vladimir Kolesnikov. Strong Conditional Oblivious Transfer and Computing on Intervals. In Advances on Cryptology - ASIACRYPT 2004, volume 3329 of Lecture Notes in Computer Science, 2004. Springer-Verlag.
    • (2004) Lecture Notes in Computer Science , vol.3329
    • Blake, I.F.1    Kolesnikov, V.2
  • 4
    • 85027202957 scopus 로고
    • Generalized Secret Sharing and Monotone Functions
    • Advances in Cryptology-CRYPTO '88, of, Springer-Verlag
    • Josh Benaloh and Jerry Leichter. Generalized Secret Sharing and Monotone Functions. In Advances in Cryptology-CRYPTO '88, volume 403 of Lecture Notes in Computer Science, 1988. Springer-Verlag, 1990.
    • (1988) Lecture Notes in Computer Science , vol.403
    • Benaloh, J.1    Leichter, J.2
  • 5
    • 84957375076 scopus 로고    scopus 로고
    • A Secure and Optimally Efficient Multi-Authority Election Scheme
    • Advances in Cryptology, EUROCRYPT '97, of, Springer-Verlag
    • Ronald Cramer, Rosario Gennaro, and Berry Schoenmakers. A Secure and Optimally Efficient Multi-Authority Election Scheme. In Advances in Cryptology - EUROCRYPT '97, volume 1233 of Lecture Notes in Computer Science, 1997. Springer-Verlag.
    • (1997) Lecture Notes in Computer Science , vol.1233
    • Cramer, R.1    Gennaro, R.2    Schoenmakers, B.3
  • 6
    • 35048871699 scopus 로고    scopus 로고
    • Single Database Private Information Retrieval with Logarithmic Communication
    • The 9th Australasian Conference on Information Security and Privacy ACISP 2004, of, Springer-Verlag
    • Yan-Cheng Chang. Single Database Private Information Retrieval with Logarithmic Communication. In The 9th Australasian Conference on Information Security and Privacy (ACISP 2004), volume 3108 of Lecture Notes in Computer Science, 2004. Springer-Verlag.
    • (2004) Lecture Notes in Computer Science , vol.3108
    • Chang, Y.1
  • 7
    • 84867553981 scopus 로고    scopus 로고
    • A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
    • Public Key Cryptography 2001, of, Springer-Verlag
    • Ivan Damgård and Mads Jurik. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In Public Key Cryptography 2001, volume 1992 of Lecture Notes in Computer Science, 2001. Springer-Verlag.
    • (2001) Lecture Notes in Computer Science , vol.1992
    • Damgård, I.1    Jurik, M.2
  • 8
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Taher Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4), 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4
    • Elgamal, T.1
  • 9
    • 84937542853 scopus 로고    scopus 로고
    • Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires
    • Topics in Cryptology, CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, of, Springer-Verlag
    • Marc Fischlin. A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires. In Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, volume 2020 of Lecture Notes in Computer Science, 2001. Springer-Verlag.
    • (2001) Lecture Notes in Computer Science , vol.2020
    • Marc Fischlin, A.1
  • 10
    • 35048820609 scopus 로고    scopus 로고
    • Efficient Private Matching and Set Intersection
    • Advances in Cryptology, EUROCRYPT 2004, of, Springer-Verlag
    • Michael J. Freedman, Kobbi Nissim, and Benny Pinkas. Efficient Private Matching and Set Intersection. In Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, 2004. Springer-Verlag.
    • (2004) Lecture Notes in Computer Science , vol.3027
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 12
    • 24944523186 scopus 로고    scopus 로고
    • On Private Scalar Product Computation for Privacy-Preserving Data Mining
    • Information Security and Cryptology, ICISC 2004, of, Springer-Verlag
    • Bart Goethals, Sven Laur, Helger Lipmaa, and Taneli Mielikäinen. On Private Scalar Product Computation for Privacy-Preserving Data Mining. In Information Security and Cryptology - ICISC 2004, volume 3506 of Lecture Notes in Computer Science, 2004. Springer-Verlag.
    • (2004) Lecture Notes in Computer Science , vol.3506
    • Goethals, B.1    Laur, S.2    Lipmaa, H.3    Mielikäinen, T.4
  • 14
    • 26444512068 scopus 로고    scopus 로고
    • Single-Database Private Information Retrieval with Constant Communication Rate
    • The 32nd International Colloquium on Automata, Languages and Programming, ICALP 2005, of, Springer-Verlag
    • Craig Gentry and Zulfikar Ramzan. Single-Database Private Information Retrieval with Constant Communication Rate. In The 32nd International Colloquium on Automata, Languages and Programming, ICALP 2005, volume 3580 of Lecture Notes in Computer Science, 2005. Springer-Verlag.
    • (2005) Lecture Notes in Computer Science , vol.3580
    • Gentry, C.1    Ramzan, Z.2
  • 15
    • 24944473997 scopus 로고    scopus 로고
    • Smooth Projective Hashing and Two-Message Oblivious Transfer
    • Advances in Cryptology, EUROCRYPT 2005, of, Springer-Verlag
    • Yael Tauman Kalai. Smooth Projective Hashing and Two-Message Oblivious Transfer. In Advances in Cryptology - EUROCRYPT 2005, volume 3494 of Lecture Notes in Computer Science, 2005. Springer-Verlag.
    • (2005) Lecture Notes in Computer Science , vol.3494
    • Tauman Kalai, Y.1
  • 16
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-Preserving Set Operations
    • Advances in Cryptology, CRYPTO 2005, 25th Annual International Cryptology Conference, of, Springer-Verlag
    • Lea Kissner and Dawn Song. Privacy-Preserving Set Operations. In Advances in Cryptology - CRYPTO 2005, 25th Annual International Cryptology Conference, volume 3621 of Lecture Notes in Computer Science, 2005. Springer-Verlag.
    • (2005) Lecture Notes in Computer Science , vol.3621
    • Kissner, L.1    Song, D.2
  • 17
    • 38049032240 scopus 로고    scopus 로고
    • Secure Vickrey Auctions without Threshold Trust
    • Financial Cryptography, Sixth International Conference, of, Springer-Verlag
    • Helger Lipmaa, N. Asokan, and Valtteri Niemi. Secure Vickrey Auctions without Threshold Trust. In Financial Cryptography - Sixth International Conference, volume 2357 of Lecture Notes in Computer Science, 2002. Springer-Verlag.
    • (2002) Lecture Notes in Computer Science , vol.2357
    • Helger Lipmaa, N.A.1    Niemi, V.2
  • 18
    • 0001258323 scopus 로고
    • Factoring integers with Elliptic Curves
    • Hendrik W. Lenstra, Jr. Factoring integers with Elliptic Curves. Annals of Mathematics, 126(2), 1987.
    • (1987) Annals of Mathematics , vol.126 , Issue.2
    • Lenstra Jr., H.W.1
  • 19
    • 33645970169 scopus 로고    scopus 로고
    • An Oblivious Transfer Protocol with Log-Squared Communication
    • The 8th Information Security Conference ISC'05, of, Springer-Verlag
    • Helger Lipmaa. An Oblivious Transfer Protocol with Log-Squared Communication. In The 8th Information Security Conference (ISC'05), volume 3650 of Lecture Notes in Computer Science, 2005. Springer-Verlag.
    • (2005) Lecture Notes in Computer Science , vol.3650
    • Lipmaa, H.1
  • 20
    • 33646728872 scopus 로고    scopus 로고
    • Private Itemset Support Counting
    • Information and Communications Security, 7th International Conference, ICICS 2005, of, Springer-Verlag
    • Sven Laur, Helger Lipmaa, and Tanel Mielikäinen. Private Itemset Support Counting. In Information and Communications Security, 7th International Conference, ICICS 2005, volume 3783 of Lecture Notes in Computer Science, 2005. Springer-Verlag.
    • (2005) Lecture Notes in Computer Science , vol.3783
    • Laur, S.1    Lipmaa, H.2    Mielikäinen, T.3
  • 22
    • 84942550998 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
    • Advances in Cryptology, EUROCRYPT '99, of, Springer-Verlag
    • Pascal Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology - EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, 1999. Springer-Verlag.
    • (1999) Lecture Notes in Computer Science , vol.1592
    • Paillier, P.1
  • 23
    • 84947772655 scopus 로고    scopus 로고
    • A New and Efficient All or Nothing Disclosure of Secrets Protocol
    • Advances on Cryptology, ASIACRYPT '98, of, Springer-Verlag
    • Julien P. Stern. A New and Efficient All or Nothing Disclosure of Secrets Protocol. In Advances on Cryptology - ASIACRYPT '98, volume 1514 of Lecture Notes in Computer Science, 1998. Springer-Verlag.
    • (1998) Lecture Notes in Computer Science , vol.1514
    • Stern, J.P.1
  • 26
    • 38049014256 scopus 로고    scopus 로고
    • Paul Zimmermann and Bruce Dodson. 20 Years of ECM. In The Algorithmic Number Theory Symposium, 4076 of Lecture Notes in Computer Science, 2006. Springer-Verlag.
    • Paul Zimmermann and Bruce Dodson. 20 Years of ECM. In The Algorithmic Number Theory Symposium, volume 4076 of Lecture Notes in Computer Science, 2006. Springer-Verlag.
  • 27
    • 38049041837 scopus 로고    scopus 로고
    • Paul Zimmermann. Optimal Parameters for ECM. Available at http://www.loria.fr/~zimmerma/records/ecm/params.html, as of May, 2006.
    • Paul Zimmermann. Optimal Parameters for ECM. Available at http://www.loria.fr/~zimmerma/records/ecm/params.html, as of May, 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.