메뉴 건너뛰기




Volumn 4450 LNCS, Issue , 2007, Pages 343-360

Multiparty computation for interval, equality, and comparison without bit-decomposition protocol

Author keywords

Bitwise sharing; Multiparty computation; Secret sharing

Indexed keywords

BITS; COMPUTATION THEORY; COMPUTER AIDED SOFTWARE ENGINEERING; POLYNOMIALS;

EID: 38049034355     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-71677-8_23     Document Type: Conference Paper
Times cited : (193)

References (25)
  • 1
    • 84937431456 scopus 로고    scopus 로고
    • Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
    • CRYPTO'02, Springer Verlag
    • J. Algesheimer, J. Camenisch, and V. Shoup, "Efficient computation modulo a shared secret with application to the generation of shared safe-prime products," CRYPTO'02, LNCS 2442, pp.417-432, Springer Verlag, 2002.
    • (2002) LNCS , vol.2442 , pp. 417-432
    • Algesheimer, J.1    Camenisch, J.2    Shoup, V.3
  • 4
    • 33750056675 scopus 로고    scopus 로고
    • A practical implementation of secure auctions based on multiparty integer computation
    • Financial Cryptography 2006, Springer Verlag
    • P. Bogetoft, I. Damgård, T. Jakobsen, K. Nielsen, J. Pagter, and T. Toft, "A practical implementation of secure auctions based on multiparty integer computation," Financial Cryptography 2006, LNCS 4107, pp. 142-147, Springer Verlag, 2006.
    • (2006) LNCS , vol.4107 , pp. 142-147
    • Bogetoft, P.1    Damgård, I.2    Jakobsen, T.3    Nielsen, K.4    Pagter, J.5    Toft, T.6
  • 5
    • 0020984292 scopus 로고
    • Lower bounds for constant depth circuits for prefix problems
    • ICALP, Springer Verlag
    • A.K. Chandra, S. Fortune, and R.J. Lipton, "Lower bounds for constant depth circuits for prefix problems," ICALP, LNCS 154, pp.109-117, Springer Verlag, 1983.
    • (1983) LNCS , vol.154 , pp. 109-117
    • Chandra, A.K.1    Fortune, S.2    Lipton, R.J.3
  • 7
    • 84898947315 scopus 로고
    • Multi-party unconditionally secure protocols
    • 88, pp
    • D. Chaum, C. Crêpeau, and I. Damgård, "Multi-party unconditionally secure protocols," Proc. ACM STOC'88, pp.11-19, 1988.
    • (1988) Proc. ACM STOC , pp. 11-19
    • Chaum, D.1    Crêpeau, C.2    Damgård, I.3
  • 8
    • 84880872502 scopus 로고    scopus 로고
    • Secure distributed linear algebra in a constant number of rounds
    • CRYPTO'01, Springer Verlag
    • R. Cramer and I. Damgård, "Secure distributed linear algebra in a constant number of rounds," CRYPTO'01, LNCS 2139, pp.119-136, Springer Verlag, 2001.
    • (2001) LNCS , vol.2139 , pp. 119-136
    • Cramer, R.1    Damgård, I.2
  • 9
    • 21144458613 scopus 로고    scopus 로고
    • Share conversion, pseudorandom secret sharing and applications to secure computation
    • Proc. 2nd Theory of Cryptography Conference, Springer Verlag
    • R. Cramer, I. Damgård, and Y. Ishai, "Share conversion, pseudorandom secret sharing and applications to secure computation," Proc. 2nd Theory of Cryptography Conference, LNCS 3378, pp.342-362, Springer Verlag, 2005.
    • (2005) LNCS , vol.3378 , pp. 342-362
    • Cramer, R.1    Damgård, I.2    Ishai, Y.3
  • 10
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty computation from threshold homomorphic encryption
    • EUROCRYPT'01, Springer Verlag
    • R. Cramer, I. Damgård, and J.B. Nielsen, "Multiparty computation from threshold homomorphic encryption," EUROCRYPT'01, LNCS 2045, pp.280-300, Springer Verlag, 2001.
    • (2001) LNCS , vol.2045 , pp. 280-300
    • Cramer, R.1    Damgård, I.2    Nielsen, J.B.3
  • 11
    • 33745567199 scopus 로고    scopus 로고
    • Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
    • Proc. 3rd Theory of Cryptography Conference, Springer Verlag
    • I. Damgârd, M. Fitzi, E. Kiltz, J.B. Nielsen, and T. Toft, "Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation," Proc. 3rd Theory of Cryptography Conference, LNCS 3876, pp.285-304, Springer Verlag, 2006.
    • (2006) LNCS , vol.3876 , pp. 285-304
    • Damgârd, I.1    Fitzi, M.2    Kiltz, E.3    Nielsen, J.B.4    Toft, T.5
  • 12
    • 84867553981 scopus 로고    scopus 로고
    • I. Damgård and M. Jurik, A generalisation, a simplification and some applications of Paillier's probabilistic public-key system, PKC 2001, LNCS 1992, pp.119-136, Springer Verlag, 2001.
    • I. Damgård and M. Jurik, "A generalisation, a simplification and some applications of Paillier's probabilistic public-key system," PKC 2001, LNCS 1992, pp.119-136, Springer Verlag, 2001.
  • 13
    • 35248844164 scopus 로고    scopus 로고
    • Universally composable efficient multiparty computation from threshold homomorphic encryption
    • CRYPTO'03, Springer Verlag
    • I. Damgård and J.B. Nielsen, "Universally composable efficient multiparty computation from threshold homomorphic encryption," CRYPTO'03, LNCS 2729, pp.247-264, Springer Verlag, 2003.
    • (2003) LNCS , vol.2729 , pp. 247-264
    • Damgård, I.1    Nielsen, J.B.2
  • 14
    • 84944328129 scopus 로고
    • Sharing decryption in the context of voting or lotteries
    • Financial Cryptography 2000, Springer Verlag
    • P.-A. Fouque, G. Poupard, and J. Stern, "Sharing decryption in the context of voting or lotteries," Financial Cryptography 2000, LNCS 1962, pp.90-104, Springer Verlag, 2000.
    • (1962) LNCS , pp. 90-104
    • Fouque, P.-A.1    Poupard, G.2    Stern, J.3
  • 15
    • 38049066663 scopus 로고    scopus 로고
    • S. L. From and T. Jakobsen, Secure multi-party computation on integers, Master's Thesis, http://www.daimi.au.dk/~mas/thesis/index.html, 2006
    • S. L. From and T. Jakobsen, "Secure multi-party computation on integers," Master's Thesis, http://www.daimi.au.dk/~mas/thesis/index.html, 2006
  • 17
    • 0023545076 scopus 로고
    • How to play any mental game or a complete theorem for protocols with honest majority
    • O. Goldreich, S. Micali, and A. Wigderson, "How to play any mental game or a complete theorem for protocols with honest majority," Proc. 19th STOC, pp.218-229, 1987.
    • (1987) Proc. 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 20
    • 24144476603 scopus 로고    scopus 로고
    • E. Ong and J. Kubiatowicz, Optimizing robustness while generating shared secret safe primes, PKC 2005, LNCS 3386, pp. 120-137, Springer Verlag, 2005.
    • E. Ong and J. Kubiatowicz, "Optimizing robustness while generating shared secret safe primes," PKC 2005, LNCS 3386, pp. 120-137, Springer Verlag, 2005.
  • 21
    • 33746092442 scopus 로고    scopus 로고
    • Efficient binary conversion for Paillier encrypted values
    • EUROCRYPT'06, Springer Verlag
    • B. Schoenmakers and P. Tuyls, "Efficient binary conversion for Paillier encrypted values," EUROCRYPT'06, LNCS 4004, pp.522-537, Springer Verlag, 2006.
    • (2006) LNCS , vol.4004 , pp. 522-537
    • Schoenmakers, B.1    Tuyls, P.2
  • 22
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Communications of ACM, vol.22, no.11, pp.612-613, 1979.
    • (1979) Communications of ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 23
    • 38049020854 scopus 로고    scopus 로고
    • Available from, Tof05http://www.daimi.au.dk/~tomas/publications/progress.pdf
    • T. Toft, "Secure integer computation with applications in economy," http://www.aicis.alexandra.dk/uk/projects/scet.demo.htm#Tof05, Available from http://www.daimi.au.dk/~tomas/publications/progress.pdf
    • Secure integer computation with applications in economy
    • Toft, T.1
  • 24
    • 38049047863 scopus 로고    scopus 로고
    • An efficient, unconditionally secure equality test for secret shared values
    • Abstract available from
    • T. Toft, "An efficient, unconditionally secure equality test for secret shared values," Workshop on Models for Cryptographic Protocols (MCP 2006), Abstract available from http://www.daimi.au.dk/~buus/mcp2006/talks/T.pdf
    • (2006) Workshop on Models for Cryptographic Protocols (MCP
    • Toft, T.1
  • 25
    • 0020312165 scopus 로고
    • Protocols for secure computation
    • A. Yao, "Protocols for secure computation," Proc. 23rd FOCS, pp. 160-164, 1982.
    • (1982) Proc. 23rd FOCS , pp. 160-164
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.