메뉴 건너뛰기




Volumn 4965 LNCS, Issue , 2008, Pages 527-544

David and goliath commitments: UC Computation for asymmetric parties using tamper-proof hardware

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER HARDWARE; HOSPITALS; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 44449101614     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-78967-3_30     Document Type: Conference Paper
Times cited : (53)

References (22)
  • 4
    • 84867248592 scopus 로고
    • Untraceable off-line cash in wallets with observers
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Brands, S.: Untraceable off-line cash in wallets with observers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 302-318. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 302-318
    • Brands, S.1
  • 5
    • 0035163054 scopus 로고    scopus 로고
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: In Proceedings of the 42nd Annual Symposium on Foundations of Computer Science, pp. 136-145 (2001); An updated version is available from the Cryptology ePrint Archive, Report 2000/067
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: In Proceedings of the 42nd Annual Symposium on Foundations of Computer Science, pp. 136-145 (2001); An updated version is available from the Cryptology ePrint Archive, Report 2000/067
  • 7
    • 84880897758 scopus 로고    scopus 로고
    • Universally composable commitments
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Canetti, R., Fischlin, M.: Universally composable commitments. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 19-40. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 19-40
    • Canetti, R.1    Fischlin, M.2
  • 8
    • 32844458303 scopus 로고    scopus 로고
    • On the limitations of universally composable two-party computation without set-up assumptions
    • Canetti, R., Kushilevitz, E., Lindell, Y.: On the limitations of universally composable two-party computation without set-up assumptions. Journal of Cryptology 19(2), 135-167 (2006)
    • (2006) Journal of Cryptology , vol.19 , Issue.2 , pp. 135-167
    • Canetti, R.1    Kushilevitz, E.2    Lindell, Y.3
  • 10
    • 44449114476 scopus 로고    scopus 로고
    • Improved UC secure computation using tamper-proof hardware. Cryptology ePrint Archive
    • Report 2007/334
    • Chandran, N., Goyal, V., Sahai, A.: Improved UC secure computation using tamper-proof hardware. Cryptology ePrint Archive, Report 2007/334 (2007)
    • (2007)
    • Chandran, N.1    Goyal, V.2    Sahai, A.3
  • 11
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
    • Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89-105. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 12
    • 84988327580 scopus 로고
    • Improved privacy in wallets with observers
    • Helleseth, T, ed, EUROCRYPT 1993, Springer, Heidelberg
    • Cramer, R., Pedersen, T.P.: Improved privacy in wallets with observers. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 329-343. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.765 , pp. 329-343
    • Cramer, R.1    Pedersen, T.P.2
  • 13
    • 84957356475 scopus 로고    scopus 로고
    • Efficient cryptographic protocols based on noisy channels
    • Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
    • Crépeau, C.: Efficient cryptographic protocols based on noisy channels. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 306-317. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 306-317
    • Crépeau, C.1
  • 16
    • 84957697395 scopus 로고    scopus 로고
    • On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Damgård, I., Kilian, J., Salvail, L.: On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 56-73. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 56-73
    • Damgård, I.1    Kilian, J.2    Salvail, L.3
  • 17
    • 44449154117 scopus 로고    scopus 로고
    • Universally composable multiparty computation with partially isolated parties. Cryptology ePrint Archive
    • Report 2007/332
    • Damgård, I., Nielsen, J.B., Wichs, D.: Universally composable multiparty computation with partially isolated parties. Cryptology ePrint Archive, Report 2007/332 (2007)
    • (2007)
    • Damgård, I.1    Nielsen, J.B.2    Wichs, D.3
  • 18
    • 38049138208 scopus 로고    scopus 로고
    • Cryptography in the multi-string model
    • Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
    • Groth, J., Ostrovsky, R.: Cryptography in the multi-string model. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 323-341. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 323-341
    • Groth, J.1    Ostrovsky, R.2
  • 20
    • 38049150653 scopus 로고    scopus 로고
    • Universally composable multi-party computation using tamper-proof hardware
    • Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
    • Katz, J.: Universally composable multi-party computation using tamper-proof hardware. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 115-128. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 115-128
    • Katz, J.1
  • 22
    • 0001226672 scopus 로고    scopus 로고
    • A parallel repetition theorem
    • Raz, R.: A parallel repetition theorem. SIAM Journal on Computing 27(3), 763-803 (1998)
    • (1998) SIAM Journal on Computing , vol.27 , Issue.3 , pp. 763-803
    • Raz, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.