메뉴 건너뛰기




Volumn 1462, Issue , 1998, Pages 121-136

Trading correctness for privacy in unconditional multi-party computation

Author keywords

Secure multi party computation; Threshold cryptography; Unconditional security; Verifiable secret sharing

Indexed keywords

BROADCASTING; CODES (SYMBOLS); CRIME; PROBABILITY;

EID: 44449153600     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0055724     Document Type: Conference Paper
Times cited : (54)

References (37)
  • 6
    • 84864708144 scopus 로고
    • Multiparty computations ensuring privacy of each party's input and correctness of the result
    • volume 293 of Lecture Notes in Computer Science, Springer-Verlag, [CDG87]
    • [CDG87] D. Chaum, I. Damgård, and J. van de Graaf. Multiparty computations ensuring privacy of each party's input and correctness of the result. In Advances in Cryptology-CRYPTO '87, volume 293 of Lecture Notes in Computer Science, pages 87-119. Springer-Verlag, 1987.
    • (1987) Advances in Cryptology-CRYPTO '87 , pp. 87-119
    • Chaum, D.1    Damgård, I.2    van de Graaf, J.3
  • 9
    • 77951106449 scopus 로고    scopus 로고
    • Multiauthority secret-ballot elections with linear work
    • volume 1070 of Lecture Notes in Computer Science. IACR, Springer-Verlag, May 1996. [CFSY96]
    • [CFSY96] R. Cramer, M. K. Franklin, B. Schoenmakers, and M. Yung. Multiauthority secret-ballot elections with linear work. In Advances in Cryptology-EUROCRYPT '96, volume 1070 of Lecture Notes in Computer Science, pages 72-83. IACR, Springer-Verlag, May 1996.
    • Advances in Cryptology-EUROCRYPT '96 , pp. 72-83
    • Cramer, R.1    Franklin, M.K.2    Schoenmakers, B.3    Yung, M.4
  • 12
    • 84957649042 scopus 로고
    • Committed oblivious transfer and private multi-party computation
    • volume 963 of Lecture Notes in Computer Science, Springer-Verlag. [CGT95]
    • [CGT95] C. Crépeau, J. van de Graaf, and A. Tapp. Committed oblivious transfer and private multi-party computation. In Advances in Cryptology-CRYPTO '95, volume 963 of Lecture Notes in Computer Science, pages 110-123. Springer-Verlag, 1995.
    • (1995) Advances in Cryptology-CRYPTO '95 , pp. 110-123
    • Crépeau, C.1    van de Graaf, J.2    Tapp, A.3
  • 13
    • 85032861451 scopus 로고
    • The spymasters double-agent problem
    • volume 435 of Lecture Notes in Computer Science, Springer-Verlag. [Cha89]
    • [Cha89] D. Chaum. The spymasters double-agent problem. In Advances in Cryptology-CRYPTO '89, volume 435 of Lecture Notes in Computer Science, pages 591-602. Springer-Verlag, 1989.
    • (1989) Advances in Cryptology-CRYPTO '89 , pp. 591-602
    • Chaum, D.1
  • 14
    • 0027341860 scopus 로고
    • Perfectly secure message transmission
    • Jan. [DDWY93]
    • [DDWY93] D. Dolev, C. Dwork, O. Waarts, and M. Yung. Perfectly secure message transmission. Journal of the ACM, 40(l):17-47, Jan. 1993.
    • (1993) Journal of the ACM , vol.40 , Issue.1 , pp. 17-47
    • Dolev, D.1    Dwork, C.2    Waarts, O.3    Yung, M.4
  • 15
    • 84936167251 scopus 로고
    • Strong verifiable secret sharing
    • volume 486 of Lecture Notes in Computer Science, Springer-Verlag. [Dwo90]
    • [Dwo90] C. Dwork. Strong verifiable secret sharing. In Proc. International Workshop on Distributed Algorithms '90, volume 486 of Lecture Notes in Computer Science, pages 213-227. Springer-Verlag, 1990.
    • (1990) Proc. International Workshop on Distributed Algorithms '90 , pp. 213-227
    • Dwork, C.1
  • 18
    • 0001710760 scopus 로고    scopus 로고
    • The design and implementation of a secure auction service
    • May [FR96]
    • [FR96] M. K. Franklin and M. K. Reiter. The design and implementation of a secure auction service. IEEE Transactions on Software Engineering, 22(5):302-312, May 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.5 , pp. 302-312
    • Franklin, M.K.1    Reiter, M.K.2
  • 21
    • 84976655650 scopus 로고
    • Cryptographic computation: Secure fault-tolerant protocols and the public-key model
    • volume 293 of Lecture Notes in Computer Science. Springer-Verlag. [GHY87]
    • [GHY87] Z. Galil, S. Haber, and M. Yung. Cryptographic computation: Secure fault-tolerant protocols and the public-key model. In Advances in Cryptology-CRYPTO '87, volume 293 of Lecture Notes in Computer Science, pages 135-155. Springer-Verlag, 1987.
    • (1987) Advances in Cryptology-CRYPTO '87 , pp. 135-155
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 22
    • 84947441722 scopus 로고    scopus 로고
    • Robust and efficient sharing of RSA functions
    • volume 1109 of Lecture Notes in Computer Science, Springer-Verlag, Aug. [GJKR96a]
    • [GJKR96a] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust and efficient sharing of RSA functions. In Advances in Cryptology-CRYPTO '96, volume 1109 of Lecture Notes in Computer Science, pages 157-172. Springer-Verlag, Aug. 1996.
    • (1996) Advances in Cryptology-CRYPTO '96 , pp. 157-172
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 23
    • 84947926543 scopus 로고    scopus 로고
    • Robust threshold DSS signatures
    • volume 1070 of Lecture Notes in Computer Science, Springer-Verlag, May [GJKR96b]
    • [GJKR96b] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. In Advances in Cryptology-EUROCRYPT '96, volume 1070 of Lecture Notes in Computer Science, pages 354-371. Springer-Verlag, May 1996.
    • (1996) Advances in Cryptology-EUROCRYPT '96 , pp. 354-371
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 33
    • 0019608784 scopus 로고
    • On sharing secrets and Reed-Solomon codes
    • [MS81]
    • [MS81] R. J. McEliece and D. V. Sarwate. On sharing secrets and Reed-Solomon codes. Communications of the ACM, 24:583-584, 1981.
    • (1981) Communications of the ACM , vol.24 , pp. 583-584
    • McEliece, R.J.1    Sarwate, D.V.2
  • 36
    • 0018545449 scopus 로고
    • How to share a secret
    • [Sha79]
    • [Sha79] A. Shamir. How to share a secret. Communications of the ACM, 22:612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.