메뉴 건너뛰기




Volumn 4833 LNCS, Issue , 2007, Pages 376-392

Simple and efficient perfectly-secure asynchronous MPC

Author keywords

Asynchronous; Efficiency; Hybrid model; Multi party computation; Perfect security

Indexed keywords

CRYPTOGRAPHY; ERROR ANALYSIS; FUNCTIONS; MATHEMATICAL MODELS;

EID: 38349009076     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-76900-2_23     Document Type: Conference Paper
Times cited : (42)

References (20)
  • 2
    • 33746365751 scopus 로고
    • Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
    • Beaver, D.: Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology, 75-122 (1991)
    • (1991) Journal of Cryptology , vol.75-122
    • Beaver, D.1
  • 3
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proc. 20th STOC, pp. 1-10 (1988)
    • (1988) Proc. 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 4
    • 33745570603 scopus 로고    scopus 로고
    • Beerliova-Trubiniova, Z., Hirt, M.: Efficient multi-party computation with dispute control. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 305-328. Springer, Heidelberg (2006)
    • Beerliova-Trubiniova, Z., Hirt, M.: Efficient multi-party computation with dispute control. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 305-328. Springer, Heidelberg (2006)
  • 5
    • 85008184918 scopus 로고
    • Asynchronous secure computations with optimal resilience (extended abstract)
    • Ben-Or, M., Kelmer, B., Rabin, T.: Asynchronous secure computations with optimal resilience (extended abstract). In: Proc. 13th PODC, pp. 183-192 (1994)
    • (1994) Proc. 13th PODC , pp. 183-192
    • Ben-Or, M.1    Kelmer, B.2    Rabin, T.3
  • 6
    • 0011797655 scopus 로고
    • An asynchronous [(n - 1)/3]-resilient consensus protocol
    • Bracha, G.: An asynchronous [(n - 1)/3]-resilient consensus protocol. In: Proc. 3rd PODC, pp. 154-162 (1984)
    • (1984) Proc. 3rd PODC , pp. 154-162
    • Bracha, G.1
  • 8
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols (extended abstract)
    • Chaum, D., Crépeau, C., Damgård, L: Multiparty unconditionally secure protocols (extended abstract). In: Proc. 20th STOC, pp. 11-19 (1988)
    • (1988) Proc. 20th STOC , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgård, L.3
  • 9
    • 84864708144 scopus 로고
    • Multiparty computations ensuring privacy of each party's input and correctness of the result
    • Pomerance, C, ed, CRYPTO 1987, Springer, Heidelberg
    • Chaum, D., Damgård, I., van de Graaf, J.: Multiparty computations ensuring privacy of each party's input and correctness of the result. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 87-119. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 87-119
    • Chaum, D.1    Damgård, I.2    van de Graaf, J.3
  • 10
    • 38349016323 scopus 로고    scopus 로고
    • Robust multiparty computation with linear communication complexity
    • CRYPTO, Springer, Heidelberg
    • Damgård, I., Nielsen, J.B.: Robust multiparty computation with linear communication complexity. In: CRYPTO 2007. LNCS, vol. 4622, Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622
    • Damgård, I.1    Nielsen, J.B.2
  • 11
    • 84976655650 scopus 로고
    • Cryptographic computation: Secure fault-tolerant protocols and the public-key model
    • Pomeranèe, C, ed, CRYPTO 1987, Springer, Heidelberg
    • Galil, Z., Haber, S., Yung, M.: Cryptographic computation: Secure fault-tolerant protocols and the public-key model. In: Pomeranèe, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 135-155. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 135-155
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 12
    • 0023545076 scopus 로고
    • How to play any mental game - a completeness theorem for protocols with honest majority
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: Proc. 19th STOC, pp. 218-229 (1987)
    • (1987) Proc. 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 13
    • 35248861868 scopus 로고    scopus 로고
    • Efficient secure multi-party computation
    • Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
    • Hirt, M., Maurer, U., Przydatek, B.: Efficient secure multi-party computation. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 143-161. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 143-161
    • Hirt, M.1    Maurer, U.2    Przydatek, B.3
  • 14
    • 33749561443 scopus 로고    scopus 로고
    • Robust multiparty computation with linear communication complexity
    • Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
    • Hirt, M., Nielsen, J.B.: Robust multiparty computation with linear communication complexity. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 463-482. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 463-482
    • Hirt, M.1    Nielsen, J.B.2
  • 15
    • 24944494113 scopus 로고    scopus 로고
    • Cryptographic asynchronous multi-party computation with optimal resilience
    • Cramer, R.J.F, ed, EU-ROCRYPT 2005, Springer, Heidelberg
    • Hirt, M., Nielsen, J.B., Przydatek, B.: Cryptographic asynchronous multi-party computation with optimal resilience. In: Cramer, R.J.F. (ed.) EU-ROCRYPT 2005. LNCS, vol. 3494, pp. 322-340. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 322-340
    • Hirt, M.1    Nielsen, J.B.2    Przydatek, B.3
  • 16
    • 84974727234 scopus 로고    scopus 로고
    • Asynchronous unconditionally secure computation: An efficiency improvement
    • Menezes, A.J, Sarkar, P, eds, INDOCRYPT 2002, Springer, Heidelberg
    • Prabhu, B., Srinathan, K., Rangan, C.P.: Asynchronous unconditionally secure computation: An efficiency improvement. In: Menezes, A.J., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2551
    • Prabhu, B.1    Srinathan, K.2    Rangan, C.P.3
  • 17
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: Proc. 21st STOC, pp. 73-85 (1989)
    • (1989) Proc. 21st STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 18
  • 19
    • 84947784853 scopus 로고    scopus 로고
    • Efficient asynchronous secure multiparty distributed computation
    • Roy, B, Okamoto, E, eds, INDOCRYPT 2000, Springer, Heidelberg
    • Srinathan, K., Rangan, C.P.: Efficient asynchronous secure multiparty distributed computation. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1977
    • Srinathan, K.1    Rangan, C.P.2
  • 20
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • Yao, A.C.: Protocols for secure computations. In: Proc. 23rd FOCS, pp. 160-164 (1982)
    • (1982) Proc. 23rd FOCS , pp. 160-164
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.