메뉴 건너뛰기




Volumn 4964 LNCS, Issue , 2008, Pages 121-137

Legally-enforceable fairness in secure two-party computation

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; SECURITY SYSTEMS;

EID: 43149090554     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-79263-5_8     Document Type: Conference Paper
Times cited : (26)

References (21)
  • 1
    • 0030646696 scopus 로고    scopus 로고
    • Optimistic Protocols for Fair Exchange
    • Asokan, N., Schunter, M., Waidner, M.: Optimistic Protocols for Fair Exchange. In: 4th CCS, pp. 8-17 (1997)
    • (1997) 4th CCS , pp. 8-17
    • Asokan, N.1    Schunter, M.2    Waidner, M.3
  • 2
    • 0024769014 scopus 로고
    • Multiparty Computation with Faulty Majority
    • Beaver, D., Goldwasser, S.: Multiparty Computation with Faulty Majority. In: 30th FOCS, pp. 468-473 (1989)
    • (1989) 30th FOCS , pp. 468-473
    • Beaver, D.1    Goldwasser, S.2
  • 3
    • 84898960610 scopus 로고
    • Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In: 20th STOC, pp. 1-10 (1988)
    • (1988) 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 4
    • 84969520105 scopus 로고    scopus 로고
    • Optimistic Fair Secure Computation
    • Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
    • Cachin, C., Camenisch, J.: Optimistic Fair Secure Computation. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 93-111. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 93-111
    • Cachin, C.1    Camenisch, J.2
  • 5
    • 0000731055 scopus 로고    scopus 로고
    • Security and Composition of Multiparty Cryptographic Protocols
    • Canetti, R.: Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology 13(1), 143-202 (2000)
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 7
    • 35248819315 scopus 로고    scopus 로고
    • Universal Composition with Joint State
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Canetti, R., Rabin, T.: Universal Composition with Joint State. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 265-281. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 265-281
    • Canetti, R.1    Rabin, T.2
  • 8
    • 84898947315 scopus 로고
    • Multi-party Unconditionally Secure Protocols
    • Chaum, D., Crépeau, C., Damgard, I.: Multi-party Unconditionally Secure Protocols. In: 20th STOC, pp. 11-19 (1988)
    • (1988) 20th STOC , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgard, I.3
  • 9
    • 35048878391 scopus 로고    scopus 로고
    • Concurrent Signatures
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Chen, L., Kudla, C., Paterson, K.: Concurrent Signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 287-305. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 287-305
    • Chen, L.1    Kudla, C.2    Paterson, K.3
  • 10
    • 0012610677 scopus 로고
    • Limits on the Security of Coin Flips when Half the Processors are Faulty
    • Cleve, R.: Limits on the Security of Coin Flips when Half the Processors are Faulty. In: 18th STOC, pp. 364-369 (1986)
    • (1986) 18th STOC , pp. 364-369
    • Cleve, R.1
  • 11
    • 33745536762 scopus 로고    scopus 로고
    • Garay, J., MacKenzie, P., Prabhakaran, M., Yang, K.: Resource Fairness and Composability of Cryptographic Protocols. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 404-428. Springer, Heidelberg (2006)
    • Garay, J., MacKenzie, P., Prabhakaran, M., Yang, K.: Resource Fairness and Composability of Cryptographic Protocols. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 404-428. Springer, Heidelberg (2006)
  • 13
    • 33645593031 scopus 로고    scopus 로고
    • Foundations of Cryptography
    • Cambridge University Press, Cambridge
    • Goldreich, O.: Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press, Cambridge (2004)
    • (2004) Basic Applications , vol.2
    • Goldreich, O.1
  • 14
    • 0023545076 scopus 로고
    • How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority
    • Goldreich, O., Micali, S., Wigderson, A.: How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In: 19th STOC, pp. 218-229 (1987)
    • (1987) 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 15
    • 84955564077 scopus 로고
    • Fair Computation of General Functions in Presence of Immoral Majority
    • Menezes, A, Vanstone, S.A, eds, CRYPTO 1990, Springer, Heidelberg
    • Goldwasser, S., Levin, L.: Fair Computation of General Functions in Presence of Immoral Majority. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 77-93. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.537 , pp. 77-93
    • Goldwasser, S.1    Levin, L.2
  • 16
    • 22344432877 scopus 로고    scopus 로고
    • Secure Computation Without Agreement
    • Goldwasser, S., Lindell, Y.: Secure Computation Without Agreement. Journal of Cryptology 18(3), 247-287 (2005)
    • (2005) Journal of Cryptology , vol.18 , Issue.3 , pp. 247-287
    • Goldwasser, S.1    Lindell, Y.2
  • 17
    • 33847139020 scopus 로고    scopus 로고
    • On the Composition of Authenticated Byzantine Agreement
    • Lindell, Y., Lysysanskaya, A., Rabin, T.: On the Composition of Authenticated Byzantine Agreement. Journal of the ACM 53(6), 881-917 (2006)
    • (2006) Journal of the ACM , vol.53 , Issue.6 , pp. 881-917
    • Lindell, Y.1    Lysysanskaya, A.2    Rabin, T.3
  • 18
    • 43149113579 scopus 로고    scopus 로고
    • Secure Protocols with Invisible Trusted Parties
    • Weizmann Institute of Science, Israel June
    • Micali, S.: Secure Protocols with Invisible Trusted Parties. Presentation on Multi-Party Secure Protocols, Weizmann Institute of Science, Israel (June 1998)
    • (1998) Presentation on Multi-Party Secure Protocols
    • Micali, S.1
  • 19
    • 1142268855 scopus 로고    scopus 로고
    • Simple and Fast Optimistic Protocols for Fair Electronic Exchange
    • Micali, S.: Simple and Fast Optimistic Protocols for Fair Electronic Exchange. In: 22nd PODC, pp. 12-19 (2003)
    • (2003) 22nd PODC , pp. 12-19
    • Micali, S.1
  • 20
    • 35248883427 scopus 로고    scopus 로고
    • Fair Secure Two-Party Computation
    • Biham, E, ed, EURO-CRYPT 2003, Springer, Heidelberg
    • Pinkas, B.: Fair Secure Two-Party Computation. In: Biham, E. (ed.) EURO-CRYPT 2003. LNCS, vol. 2656, pp. 87-105. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 87-105
    • Pinkas, B.1
  • 21
    • 0022882770 scopus 로고
    • How to Generate and Exchange Secrets
    • Yao, A.: How to Generate and Exchange Secrets. In: 27th FOCS, pp. 162-167 (1986)
    • (1986) 27th FOCS , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.