메뉴 건너뛰기




Volumn 4515 LNCS, Issue , 2007, Pages 555-572

Oblivious-transfer amplification

Author keywords

Computational weak oblivious transfer; Distributed leftover hash lemma; Hard core lemma; Oblivious transfer amplification; Universal oblivious transfer; Weak oblivious transfer

Indexed keywords

DATA TRANSFER; INFORMATION THEORY; SECURITY OF DATA; SIGNAL RECEIVERS; SPURIOUS SIGNAL NOISE; THEOREM PROVING;

EID: 38049160265     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-72540-4_32     Document Type: Conference Paper
Times cited : (52)

References (43)
  • 1
    • 85029542707 scopus 로고
    • Foundations of secure interactive computing
    • Advances in Cryptology, CRYPTO '91, of, Springer-Verlag
    • D. Beaver. Foundations of secure interactive computing. In Advances in Cryptology - CRYPTO '91, volume 1233 of LNCS, pages 377-391. Springer-Verlag, 1992.
    • (1992) LNCS , vol.1233 , pp. 377-391
    • Beaver, D.1
  • 2
    • 84928743703 scopus 로고
    • Precomputing oblivious transfer
    • Advances in Cryptology, EUROCRYPT '95, of, Springer-Verlag
    • D. Beaver. Precomputing oblivious transfer. In Advances in Cryptology - EUROCRYPT '95, volume 963 of LNCS, pages 97-109. Springer-Verlag, 1995.
    • (1995) LNCS , vol.963 , pp. 97-109
    • Beaver, D.1
  • 4
    • 84969361843 scopus 로고
    • Practical quantum oblivious transfer
    • Advances in Cryptology, CRYPTO '91, of, Springer
    • C. H. Bennett, G. Brassard, C. Crépeau, and H. Skubiszewska. Practical quantum oblivious transfer. In Advances in Cryptology - CRYPTO '91, volume 576 of LNCS, pages 351-366. Springer, 1992.
    • (1992) LNCS , vol.576 , pp. 351-366
    • Bennett, C.H.1    Brassard, G.2    Crépeau, C.3    Skubiszewska, H.4
  • 6
    • 84957360961 scopus 로고    scopus 로고
    • Oblivious transfers and privacy amplification
    • Advances in Cryptology -EUROCRYPT '97, of, Springer-Verlag
    • G. Brassard and C. Crépeau. Oblivious transfers and privacy amplification. In Advances in Cryptology -EUROCRYPT '97, volume 1233 of LNCS, pages 334-347. Springer-Verlag, 1997.
    • (1997) LNCS , vol.1233 , pp. 334-347
    • Brassard, G.1    Crépeau, C.2
  • 7
    • 21144437147 scopus 로고    scopus 로고
    • Oblivious transfers and privacy amplification
    • G. Brassard, C. Crépeau, and S. Wolf. Oblivious transfers and privacy amplification. Journal of Cryptology, 16(4):219-237, 2003.
    • (2003) Journal of Cryptology , vol.16 , Issue.4 , pp. 219-237
    • Brassard, G.1    Crépeau, C.2    Wolf, S.3
  • 8
    • 84957712978 scopus 로고    scopus 로고
    • On the foundations of oblivious transfer
    • Advances in Cryptology -EUROCRYPT '98, of, Springer-Verlag
    • C. Cachin. On the foundations of oblivious transfer. In Advances in Cryptology -EUROCRYPT '98, volume 1403 of LNCS, pages 361-374. Springer-Verlag, 1998.
    • (1998) LNCS , vol.1403 , pp. 361-374
    • Cachin, C.1
  • 9
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143-202, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 11
    • 84957356475 scopus 로고    scopus 로고
    • Efficient cryptographic protocols based on noisy channels
    • Advances in Cryptology, CRYPTO '97, of, Springer-Verlag
    • C. Crépeau. Efficient cryptographic protocols based on noisy channels. In Advances in Cryptology - CRYPTO '97, volume 1233 of LNCS, pages 306-317. Springer-Verlag, 1997.
    • (1997) LNCS , vol.1233 , pp. 306-317
    • Crépeau, C.1
  • 13
    • 23944515855 scopus 로고    scopus 로고
    • Efficient unconditional oblivious transfer from almost any noisy channel
    • Proceedings of Fourth Conference on Security in Communication Networks SCN, of, Springer-Verlag
    • C. Crépeau, K. Morozov, and S. Wolf. Efficient unconditional oblivious transfer from almost any noisy channel. In Proceedings of Fourth Conference on Security in Communication Networks (SCN), volume 3352 of LNCS, pages 47-59. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3352 , pp. 47-59
    • Crépeau, C.1    Morozov, K.2    Wolf, S.3
  • 14
    • 33746082048 scopus 로고    scopus 로고
    • C. Crépeau, G. Savvides, C. Schaffner, and J. Wullschleger. Information-theoretic conditions for two-party secure function evaluation. In Advances in Cryptology - EUROCRYPT '06, 4004 of LNCS, pages 538-554. Springer-Verlag, 2006. Full version available at http://eprint.iacr. org/2006/183.
    • C. Crépeau, G. Savvides, C. Schaffner, and J. Wullschleger. Information-theoretic conditions for two-party secure function evaluation. In Advances in Cryptology - EUROCRYPT '06, volume 4004 of LNCS, pages 538-554. Springer-Verlag, 2006. Full version available at http://eprint.iacr. org/2006/183.
  • 15
    • 26444482584 scopus 로고    scopus 로고
    • Unfair noisy channels and oblivious transfer
    • Theory of Cryptography Conference, TCC '04, of, Springer-Verlag
    • I. Damgård, S. Fehr, K. Morozov, and L. Salvail. Unfair noisy channels and oblivious transfer. In Theory of Cryptography Conference - TCC '04, volume 2951 of LNCS, pages 355-373. Springer-Verlag, 2004.
    • (2004) LNCS , vol.2951 , pp. 355-373
    • Damgård, I.1    Fehr, S.2    Morozov, K.3    Salvail, L.4
  • 17
    • 84957697395 scopus 로고    scopus 로고
    • On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
    • Advances in Cryptology, EUROCRYPT '99, of, Springer-Verlag
    • I. Damgård, J. Kilian, and L. Salvail. On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions. In Advances in Cryptology - EUROCRYPT '99, volume 1592 of LNCS, pages 56-73. Springer-Verlag, 1999.
    • (1999) LNCS , vol.1592 , pp. 56-73
    • Damgård, I.1    Kilian, J.2    Salvail, L.3
  • 18
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Commun. ACM, 28(6):637-647, 1985.
    • (1985) Commun. ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 20
    • 24944508356 scopus 로고    scopus 로고
    • Implementing oblivious transfer using collection of dense trapdoor permutations
    • Theory of Cryptography Conference, TCC '04, of, Springer-Verlag
    • I. Haitner. Implementing oblivious transfer using collection of dense trapdoor permutations. In Theory of Cryptography Conference - TCC '04, volume 2951 of LNCS, pages 394-409. Springer-Verlag, 2004.
    • (2004) LNCS , vol.2951 , pp. 394-409
    • Haitner, I.1
  • 21
    • 33749559476 scopus 로고    scopus 로고
    • On the power of the randomized iterate
    • Advances in Cryptology, CRYPTO '06, of, Springer-Verlag
    • I. Haitner, D. Harnik, and O. Reingold. On the power of the randomized iterate. In Advances in Cryptology - CRYPTO '06, volume 4117 of LNCS, pages 21-40. Springer-Verlag, 2006.
    • (2006) LNCS , vol.4117 , pp. 21-40
    • Haitner, I.1    Harnik, D.2    Reingold, O.3
  • 22
    • 24944472289 scopus 로고    scopus 로고
    • On robust combiners for oblivious transfer and other primitives
    • Advances in Cryptology, EUROCRYPT '05, of
    • D. Harnik, J. Kilian, M. Naor, O. Reingold, and A. Rosen. On robust combiners for oblivious transfer and other primitives. In Advances in Cryptology - EUROCRYPT '05, volume 3494 of LNCS, pages 96-113, 2005.
    • (2005) LNCS , vol.3494 , pp. 96-113
    • Harnik, D.1    Kilian, J.2    Naor, M.3    Reingold, O.4    Rosen, A.5
  • 25
    • 0345253860 scopus 로고    scopus 로고
    • A pseudorandom generator from any one-way function
    • J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM J. Comput., 28(4):1364-1396, 1999.
    • (1999) SIAM J. Comput , vol.28 , Issue.4 , pp. 1364-1396
    • Håstad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 28
    • 38049119127 scopus 로고    scopus 로고
    • . Reprint as 7 of ETH Series in Information Security and Cryptography, Hartung-Gorre Verlag.
    • . Reprint as vol. 7 of ETH Series in Information Security and Cryptography, Hartung-Gorre Verlag.
  • 29
    • 33745169714 scopus 로고    scopus 로고
    • One-way secret-key agreement and applications to circuit polarization and immunization of public-key encryption
    • Advances in Cryptology, CRYPTO '05, of, Springer-Verlag
    • T. Holenstein and R. Renner. One-way secret-key agreement and applications to circuit polarization and immunization of public-key encryption. In Advances in Cryptology - CRYPTO '05, volume 3621 of LNCS, pages 478-493. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3621 , pp. 478-493
    • Holenstein, T.1    Renner, R.2
  • 34
    • 38049022468 scopus 로고    scopus 로고
    • Robuster combiners for oblivious transfer
    • Theory of Cryptography Conference, TCC '07, Springer-Verlag
    • R. Meier, B. Przydatek, and J. Wullschleger. Robuster combiners for oblivious transfer. In Theory of Cryptography Conference - TCC '07, LNCS. Springer-Verlag, 2007.
    • (2007) LNCS
    • Meier, R.1    Przydatek, B.2    Wullschleger, J.3
  • 35
    • 84974655726 scopus 로고
    • Secure computation (abstract)
    • Advances in Cryptology, CRYPTO '91, of, Springer-Verlag
    • S. Micali and P. Rogaway. Secure computation (abstract). In Advances in Cryptology - CRYPTO '91, volume 576 of LNCS, pages 392-404. Springer-Verlag, 1992.
    • (1992) LNCS , vol.576 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 37
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Technical Report TR-81, Harvard Aiken Computation Laboratory
    • M. O. Rabin. How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computation Laboratory, 1981.
    • (1981)
    • Rabin, M.O.1
  • 38
    • 0006629701 scopus 로고    scopus 로고
    • Manipulating statistical difference
    • Randomization Methods in Algorithm Design DIMACS Workshop '97, of, American Mathematical Society
    • A. Sahai and S. Vadhan. Manipulating statistical difference. In Randomization Methods in Algorithm Design (DIMACS Workshop '97), volume 43 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, pages 251-270. American Mathematical Society, 1999.
    • (1999) DIMACS Series in Discrete Mathematics and Theoretical Computer Science , vol.43 , pp. 251-270
    • Sahai, A.1    Vadhan, S.2
  • 40
    • 0001998264 scopus 로고
    • Conjugate coding
    • 1
    • S. Wiesner. Conjugate coding. SIGACT News, 15(1):78-88, 1983.
    • (1983) SIGACT News
    • Wiesner, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.