메뉴 건너뛰기




Volumn 4965 LNCS, Issue , 2008, Pages 307-323

Almost-everywhere secure computation

Author keywords

Almost everywhere agreement; Bounded degree networks; Expander graphs; Secure message transmission; Secure multi party computation

Indexed keywords

ALMOST-EVERYWHERE AGREEMENT; BOUNDED-DEGREE NETWORKS; SECURE MESSAGE TRANSMISSION; SECURE MULTI-PARTY COMPUTATION;

EID: 44449163037     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-78967-3_18     Document Type: Conference Paper
Times cited : (48)

References (33)
  • 1
    • 33749546004 scopus 로고    scopus 로고
    • Asymptotically optimal two-round perfectly secure message transmission
    • Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
    • Agarwal, S., Cramer, R., de Haan, R.: Asymptotically optimal two-round perfectly secure message transmission. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117
    • Agarwal, S.1    Cramer, R.2    de Haan, R.3
  • 5
    • 79959304001 scopus 로고
    • Fast consensus in networks of bounded degree. WDAG 1990
    • Preliminary version in WDAG
    • Berman, P., Garay, J.: Fast consensus in networks of bounded degree. WDAG 1990 2(7), 62-73 (1993); Preliminary version in WDAG 1990
    • (1990) , vol.2 , Issue.7 , pp. 62-73
    • Berman, P.1    Garay, J.2
  • 8
    • 84888077711 scopus 로고    scopus 로고
    • Perfectly secure message transmission revisited
    • Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
    • Desmedt, Y., Wang, Y.: Perfectly secure message transmission revisited. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 502-517. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 502-517
    • Desmedt, Y.1    Wang, Y.2
  • 9
    • 0009768331 scopus 로고
    • The byzantine generals strike again
    • Dolev, D.: The byzantine generals strike again. Journal of Algorithms 1(3), 14-30 (1982)
    • (1982) Journal of Algorithms , vol.1 , Issue.3 , pp. 14-30
    • Dolev, D.1
  • 10
    • 0027341860 scopus 로고
    • Perfectly secure message transmission
    • Dolev, D., Dwork, C., Waarts, O., Young, M.: Perfectly secure message transmission. Journal of ACM 1(40), 17-47 (1993)
    • (1993) Journal of ACM , vol.1 , Issue.40 , pp. 17-47
    • Dolev, D.1    Dwork, C.2    Waarts, O.3    Young, M.4
  • 12
    • 38049004833 scopus 로고    scopus 로고
    • Fitzi, M., Franklin, M., Garay, J., Vardhan, S.H.: Towards optimal and efficient perfectly secure message transmission. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, Springer, Heidelberg (2007)
    • Fitzi, M., Franklin, M., Garay, J., Vardhan, S.H.: Towards optimal and efficient perfectly secure message transmission. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, Springer, Heidelberg (2007)
  • 13
    • 33745550878 scopus 로고    scopus 로고
    • Fitzi, M., Garay, J., Gollakota, S., Rangan, C.P., Srinathan, K.: Round-optimal and efficient verifiable secret sharing. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 329-342. Springer, Heidelberg (2006)
    • Fitzi, M., Garay, J., Gollakota, S., Rangan, C.P., Srinathan, K.: Round-optimal and efficient verifiable secret sharing. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 329-342. Springer, Heidelberg (2006)
  • 14
    • 44449153600 scopus 로고    scopus 로고
    • Trading correctness for privacy in unconditional mpc
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Fitzi, M., Hirt, M., Maurer, U.: Trading correctness for privacy in unconditional mpc. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462
    • Fitzi, M.1    Hirt, M.2    Maurer, U.3
  • 15
    • 84957653101 scopus 로고    scopus 로고
    • Secure communications in minimal connectivity models
    • Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
    • Franklin, M.K., Wright, R.N.: Secure communications in minimal connectivity models. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 346-360. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1403 , pp. 346-360
    • Franklin, M.K.1    Wright, R.N.2
  • 16
    • 0012525797 scopus 로고    scopus 로고
    • Garay, J., Moses, Y.: Fully polynomial Byzantine agreement for n > 3t processors in t + 1 rounds. SIAM J. Comput. 27(1), 247-290 (1998); Preliminary version in STOC 1992
    • Garay, J., Moses, Y.: Fully polynomial Byzantine agreement for n > 3t processors in t + 1 rounds. SIAM J. Comput. 27(1), 247-290 (1998); Preliminary version in STOC 1992
  • 17
    • 44449130974 scopus 로고    scopus 로고
    • Garay, J., Ostrovsky, R., Vaya, S.: Almost-eveywhere secure computation. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, Springer, Heidelberg (2007)
    • Garay, J., Ostrovsky, R., Vaya, S.: Almost-eveywhere secure computation. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, Springer, Heidelberg (2007)
  • 19
    • 21144464689 scopus 로고    scopus 로고
    • Garay, J., Perry, K.: A continuum of failure models for distributed computing. In: Segall, A., Zaks, S. (eds.) WDAG 1992. LNCS, 647, pp. 153-165. Springer, Heidelberg (1992)
    • Garay, J., Perry, K.: A continuum of failure models for distributed computing. In: Segall, A., Zaks, S. (eds.) WDAG 1992. LNCS, vol. 647, pp. 153-165. Springer, Heidelberg (1992)
  • 20
    • 84937440738 scopus 로고    scopus 로고
    • On 2-round secure multiparty computation
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Gennaro, R., Ishai, Y., Kushilevitz, E., Rabin, T.: On 2-round secure multiparty computation. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442
    • Gennaro, R.1    Ishai, Y.2    Kushilevitz, E.3    Rabin, T.4
  • 22
    • 44449096177 scopus 로고    scopus 로고
    • Goldreich, O, Secure multi-party computation, final (incomplete) draft, version 1.4 2002
    • Goldreich, O.: Secure multi-party computation, final (incomplete) draft, version 1.4 (2002)
  • 24
    • 44449103750 scopus 로고    scopus 로고
    • Truly efficient 2-round perfectly secure message transmission scheme
    • These proceedings
    • Kurosawa, K., Suzuki, K.: Truly efficient 2-round perfectly secure message transmission scheme. These proceedings
    • Kurosawa, K.1    Suzuki, K.2
  • 26
    • 84976810569 scopus 로고
    • Reaching agreement in the presence of faults. Journal of the ACM, JACM
    • April
    • Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. Journal of the ACM, JACM 27(2) (April 1980)
    • (1980) , vol.27 , Issue.2
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 28
    • 0012527611 scopus 로고    scopus 로고
    • Efficient perfectly secure message transmission in synchronous networks
    • Sayeed, H., Abu-Amara, H.: Efficient perfectly secure message transmission in synchronous networks. Information and Computation 1(126), 53-61 (1996)
    • (1996) Information and Computation , vol.1 , Issue.126 , pp. 53-61
    • Sayeed, H.1    Abu-Amara, H.2
  • 29
    • 35048814566 scopus 로고    scopus 로고
    • Optimal perfectly secure message transmission
    • Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
    • Srinathan, K., Narayanan, A., Pandu Rangan, C.: Optimal perfectly secure message transmission. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 545-561. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 545-561
    • Srinathan, K.1    Narayanan, A.2    Pandu Rangan, C.3
  • 31
    • 44449153089 scopus 로고    scopus 로고
    • Ph.D. Thesis, University of California at Los Angeles, California December
    • Vaya, S.: Almost-everywhere secure computation. Ph.D. Thesis, University of California at Los Angeles, California (December 2006)
    • (2006) Almost-everywhere secure computation
    • Vaya, S.1
  • 32
    • 44449110651 scopus 로고    scopus 로고
    • Secure computation on incomplete networks. In: Cryptology ePrint archive
    • Report 2007/346 September
    • Vaya, S.: Secure computation on incomplete networks. In: Cryptology ePrint archive, Report 2007/346 (September 2007)
    • (2007)
    • Vaya, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.