메뉴 건너뛰기




Volumn 4622 LNCS, Issue , 2007, Pages 572-590

Scalable and unconditionally secure multiparty computation

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; NETWORK PROTOCOLS;

EID: 38049152492     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74143-5_32     Document Type: Conference Paper
Times cited : (160)

References (24)
  • 1
    • 0024940038 scopus 로고    scopus 로고
    • Bar-Ilan, J., Beaver, D.: Non-cryptographic fault-tolerant computing in constant number of rounds of interaction. In: P0DC89, pp. 201-209 (1989)
    • Bar-Ilan, J., Beaver, D.: Non-cryptographic fault-tolerant computing in constant number of rounds of interaction. In: P0DC89, pp. 201-209 (1989)
  • 2
    • 85032862464 scopus 로고
    • Multiparty protocols tolerating half faulty processors
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Beaver, D.: Multiparty protocols tolerating half faulty processors. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 560-572. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 560-572
    • Beaver, D.1
  • 3
    • 84933507780 scopus 로고
    • Efficient multiparty protocols using circuit randomization
    • Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
    • Beaver, D.: Efficient multiparty protocols using circuit randomization. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 420-432. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 420-432
    • Beaver, D.1
  • 4
    • 84979502594 scopus 로고
    • Security with low communication overhead (extended abstract)
    • Menezes, A.J, Vanstone, S.A, eds, CRYPTO 1990, Springer, Heidelberg
    • Beaver, D., Feigenbaum, J., Kilian, J., Rogaway, P.: Security with low communication overhead (extended abstract). In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 62-76. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.537 , pp. 62-76
    • Beaver, D.1    Feigenbaum, J.2    Kilian, J.3    Rogaway, P.4
  • 5
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract)
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In: 20th STOC, pp. 1-10 (1988)
    • (1988) 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 6
    • 33745570603 scopus 로고    scopus 로고
    • Beerliova-Trubiniova, Z., Hirt, M.: Efficient multi-party computation with dispute control. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 305-328. Springer, Heidelberg (2006)
    • Beerliova-Trubiniova, Z., Hirt, M.: Efficient multi-party computation with dispute control. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 305-328. Springer, Heidelberg (2006)
  • 7
    • 0025137207 scopus 로고
    • The round complexity of secure protocols (extended abstract)
    • Beaver, D., Micali, S., Rogaway, P.: The round complexity of secure protocols (extended abstract). In: 22nd STOC, pp. 503-513 (1990)
    • (1990) 22nd STOC , pp. 503-513
    • Beaver, D.1    Micali, S.2    Rogaway, P.3
  • 8
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd FOCS, pp. 136-145 (2001)
    • (2001) 42nd FOCS , pp. 136-145
    • Canetti, R.1
  • 9
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols (extended abstract)
    • Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols (extended abstract). In: 20th STOC, pp. 11-19 (1988)
    • (1988) 20th STOC , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgård, I.3
  • 10
    • 84957717648 scopus 로고    scopus 로고
    • Efficient multiparty computations secure against an adaptive adversary
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Cramer, R., Damgård, I., Dziembowski, S., Hirt, M., Rabin, T.: Efficient multiparty computations secure against an adaptive adversary. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 311-326. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 311-326
    • Cramer, R.1    Damgård, I.2    Dziembowski, S.3    Hirt, M.4    Rabin, T.5
  • 11
    • 0033706246 scopus 로고    scopus 로고
    • On the complexity of verifiable secret sharing and multiparty computation
    • Cramer, R., Damgård, I., Dziembowski, S.: On the complexity of verifiable secret sharing and multiparty computation. In: 32nd STOC, pp. 325-334 (2000)
    • (2000) 32nd STOC , pp. 325-334
    • Cramer, R.1    Damgård, I.2    Dziembowski, S.3
  • 12
    • 84864708144 scopus 로고
    • Multiparty computations ensuring privacy of each party's input and correctness of the result
    • Pomerance, C ed, CRYPTO 1987, Springer, Heidelberg
    • Chaum, D., Damgård, I., van de Graaf, J.: Multiparty computations ensuring privacy of each party's input and correctness of the result. In: Pomerance, C (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 87-119. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 87-119
    • Chaum, D.1    Damgård, I.2    van de Graaf, J.3
  • 13
    • 84948975649 scopus 로고    scopus 로고
    • General secure multi-party computation from any linear secret-sharing scheme
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Cramer, R., Damgård, I., Maurer, U.: General secure multi-party computation from any linear secret-sharing scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 316-334. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 316-334
    • Cramer, R.1    Damgård, I.2    Maurer, U.3
  • 14
    • 33749557660 scopus 로고    scopus 로고
    • Scalable secure multiparty computation
    • Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
    • Damgård, I., Ishai, Y.: Scalable secure multiparty computation. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 501-520. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 501-520
    • Damgård, I.1    Ishai, Y.2
  • 15
    • 33748676639 scopus 로고    scopus 로고
    • Optimally efficient multi-valued byzantine agreement
    • Fitzi, M., Hirt, M.: Optimally efficient multi-valued byzantine agreement. In: PODC 2006 (2006)
    • (2006) PODC 2006
    • Fitzi, M.1    Hirt, M.2
  • 16
    • 0002337124 scopus 로고
    • How to play any mental game or a completeness theorem for protocols with honest majority
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: 19th STOC (1987)
    • (1987) 19th STOC
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 17
    • 0031628398 scopus 로고    scopus 로고
    • Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
    • Gennaro, R., Rabin, M., Rabin, T.: Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In: PODC'98 (1998)
    • (1998) PODC'98
    • Gennaro, R.1    Rabin, M.2    Rabin, T.3
  • 18
    • 85032194875 scopus 로고
    • How to solve any protocol problem - an efficiency improvement
    • Pomerance, C, ed, CRYPTO 1987, Springer, Heidelberg
    • Goldreich, O., Vainish, R.: How to solve any protocol problem - an efficiency improvement. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 73-86. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 73-86
    • Goldreich, O.1    Vainish, R.2
  • 19
    • 84880854377 scopus 로고    scopus 로고
    • Robustness for free in unconditional multi-party computation
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Hirt, M., Maurer, U.: Robustness for free in unconditional multi-party computation. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 101-118. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 101-118
    • Hirt, M.1    Maurer, U.2
  • 20
    • 35248861868 scopus 로고    scopus 로고
    • Efficient secure multi-party computation
    • Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
    • Hirt, M., Maurer, U.M., Przydatek, B.: Efficient secure multi-party computation. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 143-161. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 143-161
    • Hirt, M.1    Maurer, U.M.2    Przydatek, B.3
  • 21
    • 33646810497 scopus 로고    scopus 로고
    • Upper bounds on the communication complexity of optimally resilient cryptographic multiparty computation
    • Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
    • Hirt, M., Nielsen, J.B.: Upper bounds on the communication complexity of optimally resilient cryptographic multiparty computation. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 79-99. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 79-99
    • Hirt, M.1    Nielsen, J.B.2
  • 22
    • 33749561443 scopus 로고    scopus 로고
    • Robust multiparty computation with linear com-munication complexity
    • Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
    • Hirt, M., Nielsen, J.B.: Robust multiparty computation with linear com-munication complexity. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 463-482. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 463-482
    • Hirt, M.1    Nielsen, J.B.2
  • 23
    • 0024859552 scopus 로고    scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: 21th STOC, pp. 73-85.
    • 21th STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 24
    • 0001772530 scopus 로고    scopus 로고
    • Protocols for secure computations (extended abstract)
    • Yao, A.C.-C.: Protocols for secure computations (extended abstract). In: 23rd FOCS.
    • 23rd FOCS
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.