메뉴 건너뛰기




Volumn 4515 LNCS, Issue , 2007, Pages 79-96

Revisiting the efficiency of malicious two-party computation

Author keywords

Efficiency; Expander graphs; Malicious model; Secure function evaluation

Indexed keywords

COMPUTATION THEORY; COMPUTATIONAL EFFICIENCY; CRYPTOGRAPHY; FUNCTION EVALUATION; PROBLEM SOLVING;

EID: 38049107739     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-72540-4_5     Document Type: Conference Paper
Times cited : (36)

References (34)
  • 1
    • 51249173340 scopus 로고
    • Eigenvalues and expanders
    • N. Alon, Eigenvalues and expanders, Combinatorica 6, 1986, pp. 86-96.
    • (1986) Combinatorica , vol.6 , pp. 86-96
    • Alon, N.1
  • 2
    • 0026834814 scopus 로고    scopus 로고
    • Construction of asymptotically good, low-rate error-correcting codes through pseudo-random graphs
    • N. Alon, J. Bruck, J. Naor, M. Naor, and R. Roth, Construction of asymptotically good, low-rate error-correcting codes through pseudo-random graphs, IEEE Transactions on Information Theory 38 (192), pp. 509-516.
    • IEEE Transactions on Information Theory , vol.38 , Issue.192 , pp. 509-516
    • Alon, N.1    Bruck, J.2    Naor, J.3    Naor, M.4    Roth, R.5
  • 7
    • 0003882879 scopus 로고    scopus 로고
    • Spectral Graph Theory
    • AMS Publications
    • F. Chung, Spectral Graph Theory, CBMS Lecture Notes, AMS Publications, 1997.
    • (1997) CBMS Lecture Notes
    • Chung, F.1
  • 8
    • 34250210230 scopus 로고    scopus 로고
    • Concentration inequalities and martingale inequalities - a survey
    • to appear
    • F. Chung and L. Lu. Concentration inequalities and martingale inequalities - a survey, Internet Mathematics, to appear.
    • Internet Mathematics
    • Chung, F.1    Lu, L.2
  • 12
    • 6344251033 scopus 로고
    • Section 2.9 An Introduction to Probability Theory and its Applications, 3rd edition, New York: Wiley, pp
    • W. Feller, Stirling's Formula, Section 2.9 in An Introduction to Probability Theory and its Applications 1, 3rd edition, New York: Wiley, pp. 50 -53, 1968.
    • (1968) Stirling's Formula , vol.1 , pp. 50-53
    • Feller, W.1
  • 14
    • 0000871697 scopus 로고
    • Explicit constructions of linear-sized superconcentrators
    • O. Gabber and Z. Galil. Explicit constructions of linear-sized superconcentrators, JCSS, 22(3):407-420, 1981.
    • (1981) JCSS , vol.22 , Issue.3 , pp. 407-420
    • Gabber, O.1    Galil, Z.2
  • 19
    • 26444540011 scopus 로고    scopus 로고
    • An efficient noniteractive zero-knowledge proof system for NP with general assumptions
    • J. Kilian and E. Petrank. An efficient noniteractive zero-knowledge proof system for NP with general assumptions, Journal of Cryptology, 11:1-27, 1998.
    • (1998) Journal of Cryptology , vol.11 , pp. 1-27
    • Kilian, J.1    Petrank, E.2
  • 23
    • 0000848816 scopus 로고    scopus 로고
    • A. Lubotzky, R. Phillips, and P. Sarnak. Explicit expanders and the Ramanujan conjectures, STOC, 1986. See also: A. Lubotzky, R. Phillips, and P. Sarnak, Ramanujan graphs, Combinatorica 8, 1988, pp. 261-277.
    • A. Lubotzky, R. Phillips, and P. Sarnak. Explicit expanders and the Ramanujan conjectures, STOC, 1986. See also: A. Lubotzky, R. Phillips, and P. Sarnak, Ramanujan graphs, Combinatorica 8, 1988, pp. 261-277.
  • 29
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Memo. TR-81, Aiken Computation Laboratory, Harvard University
    • M. Rabin. How to exchange secrets by oblivious transfer, Technical Report Tech., Memo. TR-81, Aiken Computation Laboratory, Harvard University, 1981.
    • (1981) Technical Report Tech
    • Rabin, M.1
  • 30
    • 0002470563 scopus 로고
    • A remark of Stirling's Formula
    • H. Robbins. A remark of Stirling's Formula., Amer. Math Monthly 62, pp. 26-29, 1955.
    • (1955) Amer. Math Monthly , vol.62 , pp. 26-29
    • Robbins, H.1
  • 31
    • 0000472681 scopus 로고
    • Explicit Construction of Concentrators from Generalized N-Gons
    • R. M. Tanner. Explicit Construction of Concentrators from Generalized N-Gons, SIAM J. Alg. Discr. Math 5, 1984, pp. 287-293.
    • (1984) SIAM J. Alg. Discr. Math , vol.5 , pp. 287-293
    • Tanner, R.M.1
  • 33
    • 38049114682 scopus 로고    scopus 로고
    • D. Woodruff Revisiting the efficiency of malicious two-party computation, Cryptology ePrint Archive, Report 2006/397, 2006.
    • D. Woodruff Revisiting the efficiency of malicious two-party computation, Cryptology ePrint Archive, Report 2006/397, 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.