메뉴 건너뛰기




Volumn , Issue , 2004, Pages 232-241

Bounded-concurrent secure multi-party computation with a dishonest majority

Author keywords

Concurrent composition; Constant round protocols; Secure multi party computation; Simulation sound zero knowledge

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTER SIMULATION; KNOWLEDGE ACQUISITION; POLYNOMIALS; PROBABILITY; SUPERVISORY AND EXECUTIVE PROGRAMS;

EID: 4544250511     PISSN: 07349025     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1007352.1007393     Document Type: Conference Paper
Times cited : (122)

References (38)
  • 1
    • 0035166072 scopus 로고    scopus 로고
    • How to go beyond the black-box simulation barrier
    • B. Barak. How to go Beyond the Black-Box Simulation Barrier. In 42nd FOCS, pages 106-115, 2001.
    • (2001) 42nd FOCS , pp. 106-115
    • Barak, B.1
  • 2
    • 0036949106 scopus 로고    scopus 로고
    • Constant-round coin-tossing or realizing the shared-random string model
    • B. Barak. Constant-Round Coin-Tossing or Realizing the Shared-Random String Model. In 43rd FOCS, pages 345-355, 2002.
    • (2002) 43rd FOCS , pp. 345-355
    • Barak, B.1
  • 3
    • 0036294828 scopus 로고    scopus 로고
    • Universal arguments and their applications
    • B. Barak and O. Goldreich. Universal Arguments and their Applications. 17th CCC, pages 194-203, 2002.
    • (2002) 17th CCC , pp. 194-203
    • Barak, B.1    Goldreich, O.2
  • 4
    • 0036041101 scopus 로고    scopus 로고
    • Strict polynomial-time in simulation and extraction
    • B. Barak and Y. Lindell. Strict Polynomial-Time in Simulation and Extraction. In 34th STOC, pages 484-493, 2002.
    • (2002) 34th STOC , pp. 484-493
    • Barak, B.1    Lindell, Y.2
  • 5
    • 85029542707 scopus 로고
    • Foundations of secure interactive computing
    • Springer-Verlag (LNCS 576)
    • D. Beaver. Foundations of Secure Interactive Computing. In Crypto'91, Springer-Verlag (LNCS 576), pages 377-391, 1991.
    • (1991) Crypto'91 , pp. 377-391
    • Beaver, D.1
  • 6
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • D. Ben-Or, S. Goldwasser and A. Wigderson. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In 20'th STOC, pages 1-10, 1988.
    • (1988) 20'th STOC , pp. 1-10
    • Ben-Or, D.1    Goldwasser, S.2    Wigderson, A.3
  • 7
    • 0025137207 scopus 로고
    • The round complexity of secure protocols
    • D. Beaver, S. Micali and P. Rogaway The Round Complexity of Secure Protocols. In 22'th STOC, pages 503-513, 1990.
    • (1990) 22'th STOC , pp. 503-513
    • Beaver, D.1    Micali, S.2    Rogaway, P.3
  • 8
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti. Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology, 13(1): 143-202, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 9
    • 0038721038 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 34th STOC, pages 494-503, 2002.
    • (2002) 34th STOC , pp. 494-503
    • Canetti, R.1
  • 11
    • 35248854495 scopus 로고    scopus 로고
    • On the Limitations of universally composable two-party computation without set-up assumptions
    • Springer LNCS 2656
    • R. Canetti, E. Kushilevitz and Y. Lindell. On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions. In EuroCrypt'03, Springer LNCS 2656, pages 68-86, 2003.
    • (2003) EuroCrypt'03 , pp. 68-86
    • Canetti, R.1    Kushilevitz, E.2    Lindell, Y.3
  • 12
    • 0037605775 scopus 로고    scopus 로고
    • Black-box concurrent zero-knowledge requires (almost) logarithmically many rounds
    • R. Canetti, J. Kilian, E. Petrank and A. Rosen. Black-Box Concurrent Zero-Knowledge Requires (almost) Logarithmically Many Rounds. SIAM Jour. on Computing, Vol. 32(1), pages 1-47, 2002.
    • (2002) SIAM Jour. on Computing , vol.32 , Issue.1 , pp. 1-47
    • Canetti, R.1    Kilian, J.2    Petrank, E.3    Rosen, A.4
  • 13
    • 0036038991 scopus 로고    scopus 로고
    • Universally composable two-party and multy-party computation
    • R. Canetti, Y. Lindell, R. Ostrovsky and A. Sahai. Universally Composable Two-Party and Multy-Party Computation. In 34th STOC, pages 494-503,2002.
    • (2002) 34th STOC , pp. 494-503
    • Canetti, R.1    Lindell, Y.2    Ostrovsky, R.3    Sahai, A.4
  • 14
    • 84949308005 scopus 로고
    • Achieving independence in logarithmic number of rounds
    • B. Chor, M. Rabin. Achieving Independence in Logarithmic Number of Rounds. In 6th PODC, pages 260-268, 1987.
    • (1987) 6th PODC , pp. 260-268
    • Chor, B.1    Rabin, M.2
  • 15
    • 84948970500 scopus 로고    scopus 로고
    • Efficient concurrent zero-knowledge in the auxiliary string model
    • LNCS 1807
    • I. Damgård. Efficient Concurrent Zero-Knowledge in the Auxiliary String Model. In EuroCrypt'00, LNCS 1807, pages 418-430, 2000.
    • (2000) EuroCrypt'00 , pp. 418-430
    • Damgård, I.1
  • 16
  • 17
    • 0031632567 scopus 로고    scopus 로고
    • Concurrent zero-knowledge
    • C. Dwork, M. Naor and A. Sahai. Concurrent Zero-Knowledge. In 30th STOC, pages 409-418, 1998.
    • (1998) 30th STOC , pp. 409-418
    • Dwork, C.1    Naor, M.2    Sahai, A.3
  • 18
    • 0024984004 scopus 로고
    • Witness indistinguishability and witness hiding protocols
    • U. Feige and A. Shamir. Witness Indistinguishability and Witness Hiding Protocols. In 22nd STOC, pages 416-426, 1990.
    • (1990) 22nd STOC , pp. 416-426
    • Feige, U.1    Shamir, A.2
  • 20
    • 0029767165 scopus 로고    scopus 로고
    • On the composition of zero-knowledge proof systems
    • O. Goldreich and H. Krawczyk. On the Composition of Zero-Knowledge Proof Systems. SIAM Jour. on Computing, Vol. 25(1), pages 169-192, 1996.
    • (1996) SIAM Jour. on Computing , vol.25 , Issue.1 , pp. 169-192
    • Goldreich, O.1    Krawczyk, H.2
  • 21
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
    • O. Goldreich, S. Micali and A. Wigderson. Proofs that Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems. JACM. Vol. 38(1), pp. 691-729, 1991.
    • (1991) JACM , vol.38 , Issue.1 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 22
    • 0023545076 scopus 로고
    • How to Play any mental game - A completeness theorem for protocols with honest majority
    • O. Goldreich, S. Micali and A. Wigderson. How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In 19th STOC, pages 218-229, 1987.
    • (1987) 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 23
    • 84955564077 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • Springer-Verlag (LNCS 537)
    • S. Goldwasser and L. Levin. Fair Computation of General Functions in Presence of Immoral Majority. In Crypto'90, Springer-Verlag (LNCS 537), pages 77-93, 1990.
    • (1990) Crypto'90 , pp. 77-93
    • Goldwasser, S.1    Levin, L.2
  • 24
    • 84947284060 scopus 로고    scopus 로고
    • Secure computation without agreement
    • Springer-Verlag (LNCS 2508)
    • S. Golwasser and Y. Lindell Secure Computation without Agreement. In 16th DISC, Springer-Verlag (LNCS 2508), pages 17-32, 2002.
    • (2002) 16th DISC , pp. 17-32
    • Golwasser, S.1    Lindell, Y.2
  • 25
  • 26
    • 33749018100 scopus 로고    scopus 로고
    • Round efficiency of multi-party computation with a dishonest majority
    • Springer LNCS 2656
    • J. Katz, R. Ostrovsky and A. Smith. Round Efficiency of Multi-Party Computation with a Dishonest Majority, In EuroCrypt'03. Springer LNCS 2656 pages 578-595, 2003.
    • (2003) EuroCrypt'03 , pp. 578-595
    • Katz, J.1    Ostrovsky, R.2    Smith, A.3
  • 27
    • 0038446804 scopus 로고    scopus 로고
    • Bounded-concurrent secure two-party computation without setup assumptions
    • Y. Lindell. Bounded-Concurrent Secure Two-Party Computation Without Setup Assumptions. In 35th STOC, pages 683-692, 2003.
    • (2003) 35th STOC , pp. 683-692
    • Lindell, Y.1
  • 28
    • 0345412673 scopus 로고    scopus 로고
    • General composition and universal composability in secure multi-party computation
    • Y. Lindell. General Composition and Universal Composability in Secure Multi-Party Computation. In 44th FOCS, pages 394-403, 2003
    • (2003) 44th FOCS , pp. 394-403
    • Lindell, Y.1
  • 29
    • 35048903637 scopus 로고    scopus 로고
    • Lower bounds for concurrent self composition
    • Y. Lindell. Lower Bounds for Concurrent Self Composition. In 1st TCC, pages 203-222, 2004.
    • (2004) 1st TCC , pp. 203-222
    • Lindell, Y.1
  • 30
    • 84974655726 scopus 로고
    • Secure computation
    • Unpublished manuscript, 1992. Preliminary version, Springer-Verlag (LNCS 576)
    • S. Micali and P. Rogaway. Secure computation. Unpublished manuscript, 1992. Preliminary version in Crypto'91, Springer-Verlag (LNCS 576), pages 392-404, 1991.
    • (1991) Crypto'91 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 31
    • 35248825608 scopus 로고    scopus 로고
    • On deniability in the common reference string and random oracle model
    • Springer LNCS 2729
    • R. Pass. On Deniability in the Common Reference String and Random Oracle Model. In Crypto'03, Springer LNCS 2729, pages 316-337, 2003.
    • (2003) Crypto'03 , pp. 316-337
    • Pass, R.1
  • 32
    • 0344118869 scopus 로고    scopus 로고
    • Bounded-concurrent secure two-party computation in a constant number of rounds
    • R. Pass, A. Rosen. Bounded-Concurrent Secure Two-Party Computation in a Constant Number of Rounds. In 44th FOCS, pages 404-413, 2003.
    • (2003) 44th FOCS , pp. 404-413
    • Pass, R.1    Rosen, A.2
  • 34
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multi-party Protocols with honest majority
    • T. Rabin and M. Ben-Or. Verifiable Secret Sharing and Multi-party Protocols with Honest Majority. In 21st STOC, pages 73-85, 1989.
    • (1989) 21st STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 35
    • 84957621865 scopus 로고    scopus 로고
    • On the concurrent composition of zero-knowledge proofs
    • Springer LNCS 1592
    • R. Richardson and J. Kilian. On the Concurrent Composition of Zero-Knowledge Proofs. In EuroCrypt'99, Springer LNCS 1592, pages 415-431, 1999.
    • (1999) EuroCrypt'99 , pp. 415-431
    • Richardson, R.1    Kilian, J.2
  • 37
    • 0033342534 scopus 로고    scopus 로고
    • Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security
    • A. Sahai. Non-Malleable Non-Interactive Zero Knowledge and Adaptive Chosen-Ciphertext Security. In 40th FOCS, pages 543-553, 1999.
    • (1999) 40th FOCS , pp. 543-553
    • Sahai, A.1
  • 38
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. Yao. How to Generate and Exchange Secrets. In 27th FOCS, pages 162-167, 1986.
    • (1986) 27th FOCS , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.