메뉴 건너뛰기




Volumn 4515 LNCS, Issue , 2007, Pages 291-310

Secure computation from random error correcting codes

Author keywords

[No Author keywords available]

Indexed keywords

BROADCASTING; COMMUNICATION CHANNELS (INFORMATION THEORY); CRYPTOGRAPHY; INFORMATION DISSEMINATION; RANDOM PROCESSES; REED-SOLOMON CODES;

EID: 38049177353     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-72540-4_17     Document Type: Conference Paper
Times cited : (102)

References (31)
  • 1
    • 84933507780 scopus 로고
    • Efficient multiparty protocols using circuit randomization
    • Proceedings of CRYPTO '91, Springer Verlag
    • D. Beaver. Efficient multiparty protocols using circuit randomization. In Proceedings of CRYPTO '91, volume 576, pages 420-432. Springer Verlag LNCS, 1992.
    • (1992) LNCS , vol.576 , pp. 420-432
    • Beaver, D.1
  • 2
    • 84898960610 scopus 로고
    • Completeness theorems for noncryptographic fault-tolerant distributed computation
    • ACM Press
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic fault-tolerant distributed computation. In Proceedings of STOC 1988, pages 1-10. ACM Press, 1988.
    • (1988) Proceedings of STOC 1988 , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 4
    • 84961369151 scopus 로고
    • Security of ramp schemes
    • Proceedings CRYPTO '85, Springer Verlag
    • G. R. Blakley and C Meadows. Security of ramp schemes. In Proceedings CRYPTO '85, volume 196, pages 242-269. Springer Verlag LNCS, 1985.
    • (1985) LNCS , vol.196 , pp. 242-269
    • Blakley, G.R.1    Meadows, C.2
  • 5
    • 84898947315 scopus 로고
    • Multi-party unconditionally secure protocols
    • ACM Press
    • D. Chaum, C Crépeau, and I. Damgaard. Multi-party unconditionally secure protocols. In Proceedings of STOC 1988, pages 11-19. ACM Press, 1988.
    • (1988) Proceedings of STOC 1988 , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgaard, I.3
  • 6
    • 33749554579 scopus 로고    scopus 로고
    • Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computation over Small Fields
    • Proceedings of 26th Annual IACR CRYPTO, Santa Barbara, Ca, USA, August, Springer Verlag
    • H. Chen and R. Cramer. Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computation over Small Fields. In Proceedings of 26th Annual IACR CRYPTO, volume 4117, pages 516-531, Santa Barbara, Ca., USA, August 2006. Springer Verlag LNCS.
    • (2006) LNCS , vol.4117 , pp. 516-531
    • Chen, H.1    Cramer, R.2
  • 8
    • 0033706246 scopus 로고    scopus 로고
    • On the complexity of verifiable secret sharing and multi-party computation
    • ACM Press
    • R. Cramer, I. Damgaard, and S. Dziembowski. On the complexity of verifiable secret sharing and multi-party computation. In Proceedings of STOC 2000, pages 325-334. ACM Press, 2000.
    • (2000) Proceedings of STOC 2000 , pp. 325-334
    • Cramer, R.1    Damgaard, I.2    Dziembowski, S.3
  • 9
    • 84957717648 scopus 로고    scopus 로고
    • Efficient MultiParty Computations with Dishonest Minority
    • Proceedings of 18th Annual IACR EUROCRYPT, Prague, Czech Republic, May, Springer Verlag
    • R. Cramer, I. Damgaard, S. Dziembowski, M. Hirt, and T. Rabin. Efficient MultiParty Computations with Dishonest Minority. In Proceedings of 18th Annual IACR EUROCRYPT, volume 1592, pages 311-326, Prague, Czech Republic, May 1999. Springer Verlag LNCS.
    • (1999) LNCS , vol.1592 , pp. 311-326
    • Cramer, R.1    Damgaard, I.2    Dziembowski, S.3    Hirt, M.4    Rabin, T.5
  • 10
    • 84948975649 scopus 로고    scopus 로고
    • General secure multi-party computation from any linear secret sharing scheme
    • Proceedings of EUROCRYPT 2000, of, Springer Verlag
    • R. Cramer, I. Damgaard, and U. Maurer. General secure multi-party computation from any linear secret sharing scheme. In Proceedings of EUROCRYPT 2000, volume 1807 of LNCS, pages 316-334. Springer Verlag, 2000.
    • (2000) LNCS , vol.1807 , pp. 316-334
    • Cramer, R.1    Damgaard, I.2    Maurer, U.3
  • 11
    • 33745134732 scopus 로고    scopus 로고
    • On codes, matroids and secure multi-party computation from linear secret sharing schemes
    • Proceedings of CRYPTO 2005, of, Springer-Verlag
    • R. Cramer, V. Daza, I. Gracia, J. Jimenez Urroz, G. Leander, J. Martí-Farré, and C. Padró. On codes, matroids and secure multi-party computation from linear secret sharing schemes. In Proceedings of CRYPTO 2005, volume 3621 of LNCS, pages 327-343. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3621 , pp. 327-343
    • Cramer, R.1    Daza, V.2    Gracia, I.3    Jimenez Urroz, J.4    Leander, G.5    Martí-Farré, J.6    Padró, C.7
  • 12
    • 84880905357 scopus 로고    scopus 로고
    • On the Cost of Reconstructing a Secret- Or: VSS with Optimal Reconstruction
    • Proceedings of 21th Annual IACR CRYPTO, Santa Barbara, Ca, USA, August, Springer Verlag
    • R. Cramer, I. Damgård, and S. Fehr. On the Cost of Reconstructing a Secret- Or: VSS with Optimal Reconstruction. In Proceedings of 21th Annual IACR CRYPTO, volume 2139, pages 503-523, Santa Barbara, Ca., USA, August 2001. Springer Verlag LNCS.
    • (2001) LNCS , vol.2139 , pp. 503-523
    • Cramer, R.1    Damgård, I.2    Fehr, S.3
  • 13
    • 0026985378 scopus 로고
    • Communication complexity of secure computation
    • ACM Press
    • M. Franklin and M. Yung. Communication complexity of secure computation. In Proceedings of STOC 1992, pages 699-710. ACM Press, 1992.
    • (1992) Proceedings of STOC 1992 , pp. 699-710
    • Franklin, M.1    Yung, M.2
  • 15
    • 0030511284 scopus 로고    scopus 로고
    • On the asymptotic behavior of some towers of function fields over finite fields
    • A. Garcia and H. Stichtenoth. On the asymptotic behavior of some towers of function fields over finite fields. J. Number Theory, 61:248-273, 1996.
    • (1996) J. Number Theory , vol.61 , pp. 248-273
    • Garcia, A.1    Stichtenoth, H.2
  • 17
    • 0000942249 scopus 로고
    • Codes on algebraic curves
    • V. D. Goppa. Codes on algebraic curves. Soviet Math. Dokl, 24:170-172, 1981.
    • (1981) Soviet Math. Dokl , vol.24 , pp. 170-172
    • Goppa, V.D.1
  • 20
    • 0003956970 scopus 로고    scopus 로고
    • Addison-Wesley Publishing Company
    • S. Lang. Algebra. Addison-Wesley Publishing Company, 1997.
    • (1997) Algebra
    • Lang, S.1
  • 24
    • 1942544259 scopus 로고    scopus 로고
    • Some Basic Properties of General Nonperfect Secret Sharing Schemes
    • W. Ogata and K. Kurosawa. Some Basic Properties of General Nonperfect Secret Sharing Schemes. J. UCS, 4(8):690-704, 1998.
    • (1998) J. UCS , vol.4 , Issue.8 , pp. 690-704
    • Ogata, W.1    Kurosawa, K.2
  • 26
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In Proceedings of ACM STOC 1989, pages 73-85, 1989.
    • (1989) Proceedings of ACM STOC 1989 , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 28
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 29
    • 33747106795 scopus 로고
    • Weighted averages associated to some codes
    • J. G. Thompson. Weighted averages associated to some codes. Scripta Math., 29:449-452, 1973.
    • (1973) Scripta Math , vol.29 , pp. 449-452
    • Thompson, J.G.1
  • 31
    • 0026219389 scopus 로고
    • Generalized Hamming Weights for Linear Codes
    • V. K. Wei. Generalized Hamming Weights for Linear Codes. IEEE Transactions on Information Theory, 37(5):1412-1418, 1991.
    • (1991) IEEE Transactions on Information Theory , vol.37 , Issue.5 , pp. 1412-1418
    • Wei, V.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.