메뉴 건너뛰기




Volumn 4964 LNCS, Issue , 2008, Pages 52-70

Efficient fully-simulatable oblivious transfer

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; MATHEMATICAL MODELS; MESSAGE PASSING; NETWORK PROTOCOLS; SIGNAL RECEIVERS;

EID: 43149086402     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-79263-5_4     Document Type: Conference Paper
Times cited : (48)

References (25)
  • 1
    • 84945134014 scopus 로고    scopus 로고
    • Priced Oblivious Transfer: How to Sell Digital Goods
    • Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
    • Aiello, W., Ishai, Y., Reingold, O.: Priced Oblivious Transfer: How to Sell Digital Goods. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 119-135. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 119-135
    • Aiello, W.1    Ishai, Y.2    Reingold, O.3
  • 2
    • 35048875418 scopus 로고    scopus 로고
    • Secure Computation of the kth-Ranked Element
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Aggarwal, G., Mishra, N., Pinkas, B.: Secure Computation of the kth-Ranked Element. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 40-55. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 40-55
    • Aggarwal, G.1    Mishra, N.2    Pinkas, B.3
  • 3
    • 38049082907 scopus 로고    scopus 로고
    • Aumann, Y., Lindell, Y.: Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 137-156. Springer, Heidelberg (2007)
    • Aumann, Y., Lindell, Y.: Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137-156. Springer, Heidelberg (2007)
  • 4
    • 4544230984 scopus 로고    scopus 로고
    • Strict Polynomial-Time in Simulation and Extraction
    • Barak, B., Lindell, Y.: Strict Polynomial-Time in Simulation and Extraction. SIAM Journal on Computing 33(4), 783-818 (2004)
    • (2004) SIAM Journal on Computing , vol.33 , Issue.4 , pp. 783-818
    • Barak, B.1    Lindell, Y.2
  • 5
    • 85029542707 scopus 로고
    • Foundations of Secure Interactive Computing
    • Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
    • Beaver, D.: Foundations of Secure Interactive Computing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 377-391. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 377-391
    • Beaver, D.1
  • 6
    • 38049132285 scopus 로고    scopus 로고
    • Simulatable Adaptive Oblivious Transfer
    • Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
    • Camenisch, J., Neven, G., Shelat, A.: Simulatable Adaptive Oblivious Transfer. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 573-590. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 573-590
    • Camenisch, J.1    Neven, G.2    Shelat, A.3
  • 7
    • 0000731055 scopus 로고    scopus 로고
    • Security and Composition of Multiparty Cryptographic Protocols
    • Canetti, R.: Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology 13(1), 143-202 (2000)
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 8
    • 84947267092 scopus 로고    scopus 로고
    • Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
    • Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
    • Cramer, R., Shoup, V.: Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 9
    • 35048839833 scopus 로고    scopus 로고
    • Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes
    • Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
    • Dodis, Y., Gennaro, R., Håstad, J., Krawczyk, H., Rabin, T.: Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 494-510. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 494-510
    • Dodis, Y.1    Gennaro, R.2    Håstad, J.3    Krawczyk, H.4    Rabin, T.5
  • 10
    • 36549032633 scopus 로고    scopus 로고
    • Pairings for Cryptographers
    • Cryptology ePrint Archive Report 2006/165
    • Galbraith, S.D., Paterson, K.G., Smart, N.P.: Pairings for Cryptographers. Cryptology ePrint Archive Report 2006/165 (2006)
    • (2006)
    • Galbraith, S.D.1    Paterson, K.G.2    Smart, N.P.3
  • 11
  • 13
    • 0000108216 scopus 로고    scopus 로고
    • Goldreich, O., Kahan, A.: How To Construct Constant-Round Zero-Knowledge Proof Systems for NP. Journal of Cryptology 9(3), 167-190 (1996)
    • Goldreich, O., Kahan, A.: How To Construct Constant-Round Zero-Knowledge Proof Systems for NP. Journal of Cryptology 9(3), 167-190 (1996)
  • 14
    • 84955564077 scopus 로고
    • Computation of General Functions in Presence of Immoral Majority
    • Menezes, A, Vanstone, S.A, eds, CRYPTO 1990, Springer, Heidelberg
    • Goldwasser, S., Levin, L.: Computation of General Functions in Presence of Immoral Majority. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 77-93. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.537 , pp. 77-93
    • Goldwasser, S.1    Levin, L.2
  • 15
    • 0023545076 scopus 로고    scopus 로고
    • Goldreich, O., Micali, S., Wigderson, A.: How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In: 19th STOC, pp. 218-229 (1987) For details see [12]
    • Goldreich, O., Micali, S., Wigderson, A.: How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In: 19th STOC, pp. 218-229 (1987) For details see [12]
  • 16
    • 38149091799 scopus 로고    scopus 로고
    • Blind Identity-Based Encryption and Simulatable Oblivious Transfer
    • Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
    • Green, M., Hohenberger, S.: Blind Identity-Based Encryption and Simulatable Oblivious Transfer. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 265-282. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 265-282
    • Green, M.1    Hohenberger, S.2
  • 17
    • 24944473997 scopus 로고    scopus 로고
    • Smooth Projective Hashing and Two-Message Oblivious Transfer
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Kalai, Y.T.: Smooth Projective Hashing and Two-Message Oblivious Transfer. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 78-95. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 78-95
    • Kalai, Y.T.1
  • 18
    • 84898989941 scopus 로고
    • Founding Cryptograph on Oblivious Transfer
    • Kilian, J.: Founding Cryptograph on Oblivious Transfer. In: 20th STOC, pp. 20-31 (1988)
    • (1988) 20th STOC , pp. 20-31
    • Kilian, J.1
  • 19
    • 0031378815 scopus 로고    scopus 로고
    • Replication is NOT Needed: SINGLE Database, Computationally-Private Information Retrieval
    • Kushilevitz, E., Ostrovsky, R.: Replication is NOT Needed: SINGLE Database, Computationally-Private Information Retrieval. In: 38th FOCS, pp. 364-373 (1997)
    • (1997) 38th FOCS , pp. 364-373
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 20
    • 38049136534 scopus 로고    scopus 로고
    • An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
    • Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
    • Lindell, Y., Pinkas, B.: An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 52-78. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 52-78
    • Lindell, Y.1    Pinkas, B.2
  • 21
    • 84974655726 scopus 로고
    • Secure Computation
    • Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
    • Micali, S., Rogaway, P.: Secure Computation. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 392-404. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 23
    • 64049119146 scopus 로고    scopus 로고
    • Efficient Oblivious Transfer Protocols
    • Naor, M., Pinkas, B.: Efficient Oblivious Transfer Protocols. In: 12th SODA, pp. 448-457 (2001)
    • (2001) 12th SODA , pp. 448-457
    • Naor, M.1    Pinkas, B.2
  • 24
    • 43149090419 scopus 로고    scopus 로고
    • Rabin, M.: How to Exchange Secrets by Oblivious Transfer. Tech. Memo TR-81, Aiken Computation Laboratory, Harvard U (1981)
    • Rabin, M.: How to Exchange Secrets by Oblivious Transfer. Tech. Memo TR-81, Aiken Computation Laboratory, Harvard U (1981)
  • 25
    • 0022882770 scopus 로고
    • How to Generate and Exchange Secrets
    • Yao, A.: How to Generate and Exchange Secrets. In: 27th FOCS, pp. 162-167 (1986)
    • (1986) 27th FOCS , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.