메뉴 건너뛰기




Volumn 17, Issue 3, 2004, Pages 153-207

Adaptive versus non-adaptive security of multi-party protocols

Author keywords

Adaptive security; Definitions of security; Multi party protocols

Indexed keywords

ADAPTIVE SECURITY; CRYPTOGRAPHIC PROTOCOLS; MULTI PARTY PROTOCOLS;

EID: 4344713032     PISSN: 09332790     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00145-004-0135-x     Document Type: Article
Times cited : (30)

References (38)
  • 1
    • 33746365751 scopus 로고
    • Secure multi-party protocols and zero-knowledge proof systems tolerating a faulty minority
    • [B1]
    • [B1] D. Beaver, Secure Multi-Party Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority, J. Cryptology, vol. 4, pages 75-122, 1991.
    • (1991) J. Cryptology , vol.4 , pp. 75-122
    • Beaver, D.1
  • 2
    • 84958599141 scopus 로고    scopus 로고
    • Plug and play encryption
    • [B2]
    • [B2] D. Beaver, Plug and Play Encryption, Proc. CRYPTO '97, pages 75-89, 1997.
    • (1997) Proc. CRYPTO '97 , pp. 75-89
    • Beaver, D.1
  • 4
    • 0022880639 scopus 로고
    • Nontransitive transfer of confidence; a perfect zero-knowledge interactive protocol for SAT and beyond
    • [BC]
    • [BC] G. Brassard and C. Crepeau, Nontransitive Transfer of Confidence: A Perfect Zero-Knowledge Interactive Protocol for SAT and Beyond, Proc. 27th FOCS, pages 188-195, 1986.
    • (1986) Proc. 27th FOCS , pp. 188-195
    • Brassard, G.1    Crepeau, C.2
  • 5
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • [BGW]
    • [BGW] M. Ben-Or, S. Goldwasser, and A. Wigderson, Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation, Proc. 20th STOC, pages 1-10, 1988.
    • (1988) Proc. 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 6
    • 0000917097 scopus 로고
    • Cryptographic protocols provably secure against dynamic adversaries
    • [BH]
    • [BH] D. Beaver and S. Haber, Cryptographic Protocols Provably Secure Against Dynamic Adversaries, Proc. Eurocrypt '92, pages 307-323, 1992.
    • (1992) Proc. Eurocrypt '92 , pp. 307-323
    • Beaver, D.1    Haber, S.2
  • 7
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • [C1]
    • [C1] R. Canetti, Security and Composition of Multiparty Cryptographic Protocols, J. Cryptology, vol. 13, no. 1, pages 143-202, 2000. On-line version at http:/philby.ucsd.edu/cryptolib/1998/98-18.html.
    • (2000) J. Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 8
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • [C2]
    • [C2] R. Canetti, Universally Composable Security: A New Paradigm for Cryptographic Protocols, Proc. 42nd FOCS, pages 136-145,2001. Full version available at http/eprint.iacr.org/2000/067.
    • (2001) Proc. 42nd FOCS , pp. 136-145
    • Canetti, R.1
  • 9
    • 84898947315 scopus 로고
    • Multi-party unconditionally secure protocols
    • [CCD]
    • [CCD] D. Chaum, C. Crepeau, and I. Damgaard, Multi-Party Unconditionally Secure Protocols, Proc. 20th STOC, pages 11-19, 1988.
    • (1988) Proc. 20th STOC , pp. 11-19
    • Chaum, D.1    Crepeau, C.2    Damgaard, I.3
  • 10
    • 84864708144 scopus 로고
    • Multi-party computations ensuring privacy of each party's input and correctness of the result
    • [CDG]
    • [CDG] D. Chaum, I. Damgaard, and J. van de Graaf, Multi-Party Computations Ensuring Privacy of Each Party's Input and Correctness of the Result, Proc. CRYPTO '87, pages 87-119, 1987.
    • (1987) Proc. CRYPTO '87 , pp. 87-119
    • Chaum, D.1    Damgaard, I.2    Van De Graaf, J.3
  • 11
    • 84948975649 scopus 로고    scopus 로고
    • General secure multi-party computation from any linear secret-sharing scheme
    • [CDM]
    • [CDM] R. Cramer, I. Damgaard, and U. Maurer, General Secure Multi-Party Computation from Any Linear Secret-Sharing Scheme, Proc. EuroCrypt 2000, pages 316-334, 2000.
    • (2000) Proc. EuroCrypt 2000 , pp. 316-334
    • Cramer, R.1    Damgaard, I.2    Maurer, U.3
  • 12
    • 0029723583 scopus 로고    scopus 로고
    • Adaptively secure computation
    • [CFGN]. Fuller version in MIT-LCS-TR #682, 1996
    • [CFGN] R. Canetti, U. Feige, O. Goldreich, and M. Naor, Adaptively Secure Computation, Proc. 28th STOC, pages 639-648, 1996. Fuller version in MIT-LCS-TR #682, 1996.
    • (1996) Proc. 28th STOC , pp. 639-648
    • Canetti, R.1    Feige, U.2    Goldreich, O.3    Naor, M.4
  • 13
    • 0346528350 scopus 로고
    • Cryptographically strong undeniable signatures, unconditionally secure for the signer
    • [CHP]
    • [CHP] D. Chaum, E. v. Heijst, and B. Pfitzmann, Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer, Proc. CRYPTO '91, pages 470-484, 1991.
    • (1991) Proc. CRYPTO '91 , pp. 470-484
    • Chaum, D.1    Heijst, E.V.2    Pfitzmann, B.3
  • 14
    • 0024860209 scopus 로고
    • A zero-one law for Boolean privacy
    • [CK]
    • [CK] B. Chor and E. Kushilevitz, A Zero-One Law for Boolean Privacy, SIAM J. Disc. Math., vol. 4, pages 36-47, 1991. Preliminary version in Proc. 21st STOC, pages 62-72, 1989.
    • (1991) SIAM J. Disc. Math. , vol.4 , pp. 36-47
    • Chor, B.1    Kushilevitz, E.2
  • 15
    • 0024860209 scopus 로고
    • Preliminary version
    • [CK] B. Chor and E. Kushilevitz, A Zero-One Law for Boolean Privacy, SIAM J. Disc. Math., vol. 4, pages 36-47, 1991. Preliminary version in Proc. 21st STOC, pages 62-72, 1989.
    • (1989) Proc. 21st STOC , pp. 62-72
  • 16
    • 84870707379 scopus 로고    scopus 로고
    • A practical public-key cryptosystem provably secure against adaptive chosen ciphertext attack
    • [CS]
    • [CS] R. Cramer and V. Shoup, A Practical Public-Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack, Proc. CRYPTO '98, pages 13-25, 1998.
    • (1998) Proc. CRYPTO '98 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 17
    • 0343337504 scopus 로고    scopus 로고
    • Non-malleable cryptography
    • [DDN]
    • [DDN] D. Dolev, C. Dwork, and M. Naor, Non-Malleable Cryptography, SIAM J. Computing, vol. 30, no. 2, pp. 391-437, 2000. Preliminary version in STOC'91.
    • (2000) SIAM J. Computing , vol.30 , Issue.2 , pp. 391-437
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 18
    • 0343337504 scopus 로고    scopus 로고
    • Preliminary version
    • [DN] D. Dolev, C. Dwork, and M. Naor, Non-Malleable Cryptography, SIAM J. Computing, vol. 30, no. 2, pp. 391-437, 2000. Preliminary version in STOC'91.
    • STOC'91
  • 19
    • 84974597111 scopus 로고    scopus 로고
    • Parallel reducibility for information-theoretically secure computation
    • [DM]
    • [DM] Y. Dodis and S. Micali, Parallel Reducibility for Information-Theoretically Secure Computation, Proc. CRYPTO 2000, pages 74-92, 2000.
    • (2000) Proc. CRYPTO 2000 , pp. 74-92
    • Dodis, Y.1    Micali, S.2
  • 20
    • 84974602942 scopus 로고    scopus 로고
    • Improved non-committing encryption schemes based on a general complexity assumption
    • [DN]
    • [DN] I. Damgaard and J. Nielsen, Improved Non-Committing Encryption Schemes Based on a General Complexity Assumption, Proc. CRYPTO 2000, pages 432-450, 2000.
    • (2000) Proc. CRYPTO 2000 , pp. 432-450
    • Damgaard, I.1    Nielsen, J.2
  • 23
    • 0012527958 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • [GL]
    • [GL] S. Goldwasser and L. Levin, Fair Computation of General Functions in Presence of Immoral Majority, Proc. CRYPTO '90, pages 77-93, 1990.
    • (1990) Proc. CRYPTO '90 , pp. 77-93
    • Goldwasser, S.1    Levin, L.2
  • 24
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • [GM], April
    • [GM] S. Goldwasser and S. Micali, Probabilistic encryption, J. Comput. Systems Sci., vol. 28, no. 2, pages 270-299, April 1984.
    • (1984) J. Comput. Systems Sci. , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 26
    • 0002365530 scopus 로고
    • Privacy and communication complexity
    • [K]
    • [K] E. Kushilevitz, Privacy and Communication Complexity, SIAM J. Discrete Math., vol. 5, no. 2, pages 273-284, 1992. Preliminary version in Proc. 29th FOCS, 1989.
    • (1992) SIAM J. Discrete Math. , vol.5 , Issue.2 , pp. 273-284
    • Kushilevitz, E.1
  • 27
    • 4344686233 scopus 로고
    • Preliminary version
    • [K] E. Kushilevitz, Privacy and Communication Complexity, SIAM J. Discrete Math., vol. 5, no. 2, pages 273-284, 1992. Preliminary version in Proc. 29th FOCS, 1989.
    • (1989) Proc. 29th FOCS
  • 28
    • 0033725451 scopus 로고    scopus 로고
    • Reducibility and completeness in private computations
    • [KKMO]
    • [KKMO] J. Kilian, E. Kushilevitz, S. Micali, and R. Ostrovsky, Reducibility and Completeness in Private Computations, SIAM J. Computing, vol. 29, pages 1189-1208, 2000. Preliminary versions by Kilian in Proc. 23rd STOC, 1991, and by Kushilevitz, Micali, and Ostrovsky in Proc. 35th FOCS, 1994.
    • (2000) SIAM J. Computing , vol.29 , pp. 1189-1208
    • Kilian, J.1    Kushilevitz, E.2    Micali, S.3    Ostrovsky, R.4
  • 29
    • 0033725451 scopus 로고    scopus 로고
    • Preliminary versions
    • [KKMO] J. Kilian, E. Kushilevitz, S. Micali, and R. Ostrovsky, Reducibility and Completeness in Private Computations, SIAM J. Computing, vol. 29, pages 1189-1208, 2000. Preliminary versions by Kilian in Proc. 23rd STOC, 1991, and by Kushilevitz, Micali, and Ostrovsky in Proc. 35th FOCS, 1994.
    • (1991) Proc. 23rd STOC
    • Kilian1
  • 30
    • 0033725451 scopus 로고    scopus 로고
    • [KKMO] J. Kilian, E. Kushilevitz, S. Micali, and R. Ostrovsky, Reducibility and Completeness in Private Computations, SIAM J. Computing, vol. 29, pages 1189-1208, 2000. Preliminary versions by Kilian in Proc. 23rd STOC, 1991, and by Kushilevitz, Micali, and Ostrovsky in Proc. 35th FOCS, 1994.
    • (1994) Proc. 35th FOCS
    • Kushilevitz1    Micali2    Ostrovsky3
  • 31
    • 84974655726 scopus 로고
    • [MR], unpublished manuscript
    • [MR] S. Micali and P. Rogaway, Secure Computation, unpublished manuscript, 1992. Preliminary version in Proc. CRYPTO '91, pages 392-404, 1991.
    • (1992) Secure Computation
    • Micali, S.1    Rogaway, P.2
  • 32
    • 84974655726 scopus 로고
    • Preliminary version
    • [MR] S. Micali and P. Rogaway, Secure Computation, unpublished manuscript, 1992. Preliminary version in Proc. CRYPTO '91, pages 392-404, 1991.
    • (1991) Proc. CRYPTO '91 , pp. 392-404
  • 33
    • 0000845043 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • [P]
    • [P] T. P. Pedersen, Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Proc. CRYPTO '91, pages 129-140, 1991.
    • (1991) Proc. CRYPTO '91 , pp. 129-140
    • Pedersen, T.P.1
  • 36
    • 0033342534 scopus 로고    scopus 로고
    • Non-malleable, non-interactive zero knowledge and adaptive chosen ciphertext security
    • [S]
    • [S] A. Sahai, Non-Malleable, Non-Interactive Zero Knowledge and Adaptive Chosen Ciphertext Security, Proc. 40th FOCS, pages 543-553, 1999.
    • (1999) Proc. 40th FOCS , pp. 543-553
    • Sahai, A.1
  • 37
    • 0020312165 scopus 로고
    • Protocols for secure computation
    • [Y1]
    • [Y1] A. Yao, Protocols for Secure Computation, Proc. 23rd FOCS, pages 160-164, 1982.
    • (1982) Proc. 23rd FOCS , pp. 160-164
    • Yao, A.1
  • 38
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • [Y2]
    • [Y2] A. Yao, How to generate and exchange secrets, Proc. 21th FOCS, pages 162-167, 1986.
    • (1986) Proc. 21th FOCS , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.