메뉴 건너뛰기




Volumn 4622 LNCS, Issue , 2007, Pages 284-302

How many oblivious transfers are needed for secure multiparty computation?

Author keywords

[No Author keywords available]

Indexed keywords

DATA TRANSFER; INFORMATION THEORY; NETWORK PROTOCOLS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 38049107215     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74143-5_16     Document Type: Conference Paper
Times cited : (25)

References (48)
  • 1
    • 17744366431 scopus 로고    scopus 로고
    • 0 In: 45th FOCS, pp. 166-175 (2004)
    • 0 In: 45th FOCS, pp. 166-175 (2004)
  • 2
    • 33745116951 scopus 로고    scopus 로고
    • Secure computation of constant-depth circuits with applications to database search problems
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Barkol, O., Ishai, Y.: Secure computation of constant-depth circuits with applications to database search problems. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 395-411. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 395-411
    • Barkol, O.1    Ishai, Y.2
  • 3
    • 84928743703 scopus 로고
    • Precomputing oblivious transfer
    • Coppersmith, D, ed, CRYPTO 1995, Springer, Heidelberg
    • Beaver, D.: Precomputing oblivious transfer. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 97-109. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.963 , pp. 97-109
    • Beaver, D.1
  • 4
    • 0029702967 scopus 로고    scopus 로고
    • Correlated pseudorandomness and the complexity of private computations
    • Beaver, D.: Correlated pseudorandomness and the complexity of private computations. In: 28th STOC, pp. 479-488 (1996)
    • (1996) 28th STOC , pp. 479-488
    • Beaver, D.1
  • 5
    • 35048856983 scopus 로고    scopus 로고
    • Beimel, A., Malkin, T.: A quantitative approach to reductions in secure computation. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 238-257. Springer, Heidelberg (2004)
    • Beimel, A., Malkin, T.: A quantitative approach to reductions in secure computation. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 238-257. Springer, Heidelberg (2004)
  • 6
    • 84957064831 scopus 로고    scopus 로고
    • The all-or-nothing nature of two-party secure computation
    • Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
    • Beimel, A., Malkin, T., Micali, S.: The all-or-nothing nature of two-party secure computation. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 80-97. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 80-97
    • Beimel, A.1    Malkin, T.2    Micali, S.3
  • 7
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • BenOr, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: 20th STOC, pp. 1-10 (1988)
    • (1988) 20th STOC , pp. 1-10
    • BenOr, M.1    Goldwasser, S.2    Wigderson, A.3
  • 8
    • 0003661492 scopus 로고
    • Bit optimal distributed consensus
    • Plenum Publishing Corporation
    • Berman, P., Garay, J., Perry, K.: Bit optimal distributed consensus. In: Computer Science Research, pp. 313-332. Plenum Publishing Corporation (1992)
    • (1992) Computer Science Research , pp. 313-332
    • Berman, P.1    Garay, J.2    Perry, K.3
  • 9
    • 0023436302 scopus 로고
    • An o(log n) expected rounds randomized byzantine generals protocol
    • Bracha, G.: An o(log n) expected rounds randomized byzantine generals protocol. Journal of the ACM 34(4), 910-920 (1987)
    • (1987) Journal of the ACM , vol.34 , Issue.4 , pp. 910-920
    • Bracha, G.1
  • 10
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 143-202 (2000)
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 11
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols
    • Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols. In: 20th STOC, pp. 11-19 (1988)
    • (1988) 20th STOC , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgård, I.3
  • 12
    • 0026839969 scopus 로고
    • Modular construction of a byzantine agreement protocol with optimal message bit complexity
    • Coan, B., Welch, J.: Modular construction of a byzantine agreement protocol with optimal message bit complexity. Information and Computation, 97(1) (1992)
    • (1992) Information and Computation , vol.97 , Issue.1
    • Coan, B.1    Welch, J.2
  • 13
    • 0024132071 scopus 로고
    • Achieving oblivious transfer using weakened security assumptions
    • Crépeau, C., Kilian, J.: Achieving oblivious transfer using weakened security assumptions. In: 29th FOCS, pp. 42-52 (1988)
    • (1988) 29th FOCS , pp. 42-52
    • Crépeau, C.1    Kilian, J.2
  • 14
    • 84957697395 scopus 로고    scopus 로고
    • On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Damgård, I., Kilian, J., Salvail, L.: On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 56-73. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 56-73
    • Damgård, I.1    Kilian, J.2    Salvail, L.3
  • 15
    • 84957611040 scopus 로고    scopus 로고
    • Lower bounds for oblivious transfer reductions
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Dodis, Y., Micali, S.: Lower bounds for oblivious transfer reductions. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 42-55. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 42-55
    • Dodis, Y.1    Micali, S.2
  • 17
  • 18
    • 38049004833 scopus 로고    scopus 로고
    • Fitzi, M., Franklin, M., Garay, J., Vardhan, H.: Towards optimal and efficient perfectly secure message transmission. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, Springer, Heidelberg (2007)
    • Fitzi, M., Franklin, M., Garay, J., Vardhan, H.: Towards optimal and efficient perfectly secure message transmission. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, Springer, Heidelberg (2007)
  • 19
    • 0002992068 scopus 로고    scopus 로고
    • Joint encryption and message-efficient secure computation
    • Franklin, M., Haber, S.: Joint encryption and message-efficient secure computation. J. Cryptology 9(4), 217-232 (1996)
    • (1996) J. Cryptology , vol.9 , Issue.4 , pp. 217-232
    • Franklin, M.1    Haber, S.2
  • 20
    • 0000871697 scopus 로고
    • Explicit constructions of linear-sized superconcentrators
    • Gabber, O., Galil, Z.: Explicit constructions of linear-sized superconcentrators. JCSS 22(3), 407-420 (1981)
    • (1981) JCSS , vol.22 , Issue.3 , pp. 407-420
    • Gabber, O.1    Galil, Z.2
  • 22
    • 0023545076 scopus 로고
    • How to play any mental game - a completeness theorem for protocols with honest majority
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: 19th STOC, pp. 218-229 (1987)
    • (1987) 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 23
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity, or all languages in NP have zero-knowledge proof system
    • Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity, or all languages in NP have zero-knowledge proof system. Journal of the ACM 38(1), 691-729 (1991)
    • (1991) Journal of the ACM , vol.38 , Issue.1 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 24
    • 85032194875 scopus 로고
    • How to solve any protocol problem - an efficiency improvement
    • Pomerance, C, ed, CRYPTO 1987, Springer, Heidelberg
    • Goldreich, O., Vainish, R.: How to solve any protocol problem - an efficiency improvement. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 73-86. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 73-86
    • Goldreich, O.1    Vainish, R.2
  • 25
    • 0031504510 scopus 로고    scopus 로고
    • Goldreich, O., Wigderson, A.: Tiny families of functions with random properties: A quality-size trade-off for hashin. Rand. Structs. and Algs. 11(4), 315-343 (1997)
    • Goldreich, O., Wigderson, A.: Tiny families of functions with random properties: A quality-size trade-off for hashin. Rand. Structs. and Algs. 11(4), 315-343 (1997)
  • 27
    • 24944472289 scopus 로고    scopus 로고
    • On tolerant combiners for oblivious transfer and other primitives
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Harnik, D., Kilian, J., Naor, M., Reingold, O., Rosen, A.: On tolerant combiners for oblivious transfer and other primitives. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 96-113. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 96-113
    • Harnik, D.1    Kilian, J.2    Naor, M.3    Reingold, O.4    Rosen, A.5
  • 28
    • 4544297111 scopus 로고    scopus 로고
    • Completeness in two-party secure computation - a computational view
    • Harnik, D., Naor, M., Reingold, O., Rosen, A.: Completeness in two-party secure computation - a computational view. In: 36th STOC, pp. 252-261 (2004)
    • (2004) 36th STOC , pp. 252-261
    • Harnik, D.1    Naor, M.2    Reingold, O.3    Rosen, A.4
  • 29
    • 33745999816 scopus 로고    scopus 로고
    • Player simulation and general adversary structures in perfect multiparty computation
    • Hirt, M., Maurer, U.: Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology 13(1), 31-60 (2000)
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 31-60
    • Hirt, M.1    Maurer, U.2
  • 30
    • 0024866742 scopus 로고
    • Limits on the provable consequences of one-way permutations
    • Impagliazzo, R., Rudich, S.: Limits on the provable consequences of one-way permutations. In: 21st STOC, pp. 44-61 (1989)
    • (1989) 21st STOC , pp. 44-61
    • Impagliazzo, R.1    Rudich, S.2
  • 31
    • 24144457853 scopus 로고    scopus 로고
    • Extending oblivious transfers efficiently
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 145-161
    • Ishai, Y.1    Kilian, J.2    Nissim, K.3    Petrank, E.4
  • 32
    • 0344981502 scopus 로고    scopus 로고
    • Deterministic extractors for bit-fixing sources and exposure-resilient cryptography
    • Kamp, J., Zuckerman, D.: Deterministic extractors for bit-fixing sources and exposure-resilient cryptography. In: 44th FOCS, pp. 92-101 (2003)
    • (2003) 44th FOCS , pp. 92-101
    • Kamp, J.1    Zuckerman, D.2
  • 33
    • 84898989941 scopus 로고
    • Founding cryptography on oblivious transfer
    • Kilian, J.: Founding cryptography on oblivious transfer. In: 20th STOC, pp. 20-31 (1988)
    • (1988) 20th STOC , pp. 20-31
    • Kilian, J.1
  • 34
    • 4544353942 scopus 로고
    • A general completeness theorem for two-party games
    • Kilian, J.: A general completeness theorem for two-party games. In: 23rd STOC, pp. 553-560 (1991)
    • (1991) 23rd STOC , pp. 553-560
    • Kilian, J.1
  • 35
    • 38049008242 scopus 로고    scopus 로고
    • Towards secure and scalable computation in peer-to-peer networks
    • King, V., Saia, J., Sanwalani, V., Vee, E.: Towards secure and scalable computation in peer-to-peer networks. In: 47th FOCS, pp. 87-98 (2006)
    • (2006) 47th FOCS , pp. 87-98
    • King, V.1    Saia, J.2    Sanwalani, V.3    Vee, E.4
  • 36
    • 0000789645 scopus 로고
    • Explicit constructions of concentrators
    • Margulis, G.: Explicit constructions of concentrators. Problemy peredaci informacii 9(4), 71-80 (1973)
    • (1973) Problemy peredaci informacii , vol.9 , Issue.4 , pp. 71-80
    • Margulis, G.1
  • 37
    • 38049022468 scopus 로고    scopus 로고
    • Meier, R., Przydatek, B., Wullschleger, J.: Robuster combiners for oblivious transfer. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, Springer, Heidelberg (2007)
    • Meier, R., Przydatek, B., Wullschleger, J.: Robuster combiners for oblivious transfer. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, Springer, Heidelberg (2007)
  • 39
    • 0028062297 scopus 로고
    • Simple and efficient leader election in the full information model
    • Ostrovsky, R., Rajagopalan, S., Vazirani, U.: Simple and efficient leader election in the full information model. In: 26th STOC, pp. 234-242 (1994)
    • (1994) 26th STOC , pp. 234-242
    • Ostrovsky, R.1    Rajagopalan, S.2    Vazirani, U.3
  • 40
    • 38049142508 scopus 로고    scopus 로고
    • Rabin, M.O.: How to exchange secrets by oblivious transfer. TR-81, Harvard (1981)
    • Rabin, M.O.: How to exchange secrets by oblivious transfer. TR-81, Harvard (1981)
  • 41
    • 0002956996 scopus 로고    scopus 로고
    • Bounds for dispersers, extractors, and depth-two superconcentrators
    • Radhakrishnan, J., Ta-Shma, A.: Bounds for dispersers, extractors, and depth-two superconcentrators. SIAM J. Discrete Math. 13(1), 2-24 (2000)
    • (2000) SIAM J. Discrete Math , vol.13 , Issue.1 , pp. 2-24
    • Radhakrishnan, J.1    Ta-Shma, A.2
  • 42
    • 38049142982 scopus 로고    scopus 로고
    • Entropy waves, the zig-zag graph product, and new constant-degree expanders and extractors. ECCC
    • Reingold, O., Vadhan, S., Wigderson, A.: Entropy waves, the zig-zag graph product, and new constant-degree expanders and extractors. ECCC, 8(18) (2001)
    • (2001) , vol.8 , Issue.18
    • Reingold, O.1    Vadhan, S.2    Wigderson, A.3
  • 43
    • 0012579059 scopus 로고    scopus 로고
    • Recent developments in explicit constructions of extractors
    • Shaltiel, R.: Recent developments in explicit constructions of extractors. Bulletin of the EATCS 77, 67-95 (2002)
    • (2002) Bulletin of the EATCS , vol.77 , pp. 67-95
    • Shaltiel, R.1
  • 44
    • 0001998264 scopus 로고
    • Conjugate coding
    • 1
    • Wiesner, S.: Conjugate coding. SIGACT News 15(1), 78-88 (1983)
    • (1983) SIGACT News
    • Wiesner, S.1
  • 45
    • 38049160265 scopus 로고    scopus 로고
    • Wullschleger, J.: Oblivious transfer amplification. In: Naor, M. (ed.) EUROCRYPT 2007, 4515, pp. 555-572. Springer, Heidelberg (2007)
    • Wullschleger, J.: Oblivious transfer amplification. In: Naor, M. (ed.) EUROCRYPT 2007, vol. 4515, pp. 555-572. Springer, Heidelberg (2007)
  • 46
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • Yao, A.C.: Protocols for secure computations. In: 23rd FOCS, pp. 160-164 (1982)
    • (1982) 23rd FOCS , pp. 160-164
    • Yao, A.C.1
  • 47
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • Yao, A.C.: How to generate and exchange secrets. In: 27th FOCS, pp. 162-167 (1986)
    • (1986) 27th FOCS , pp. 162-167
    • Yao, A.C.1
  • 48
    • 0029703647 scopus 로고    scopus 로고
    • Randomness-optimal sampling, extractors, and constructive leader election
    • Zuckerman, D.: Randomness-optimal sampling, extractors, and constructive leader election. In: 28th STOC, pp. 286-295 (1996)
    • (1996) 28th STOC , pp. 286-295
    • Zuckerman, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.