메뉴 건너뛰기




Volumn 5157 LNCS, Issue , 2008, Pages 554-571

A framework for efficient and composable oblivious transfer

Author keywords

[No Author keywords available]

Indexed keywords

BIT OPERATIONS; CIPHER TEXTS; CRYPTOLOGY; CRYPTOSYSTEMS; DIFFIE-HELLMAN ASSUMPTIONS; DUAL MODES; ENCRYPTION AND DECRYPTION; GENERAL FRAMEWORK; MULTI-BIT; OBLIVIOUS TRANSFER; PUBLIC KEY; PUBLIC KEYS; RANDOM STRINGS; SECURITY PARAMETERS; SPACE COMPLEXITIES; TECHNICAL CONTRIBUTION; UNIVERSALLY COMPOSABLE;

EID: 51849126892     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85174-5_31     Document Type: Conference Paper
Times cited : (486)

References (34)
  • 1
    • 84945134014 scopus 로고    scopus 로고
    • Priced oblivious transfer: How to sell digital goods
    • Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
    • Aiello, W., Ishai, Y., Reingold, O.: Priced oblivious transfer: How to sell digital goods. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 119-135. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 119-135
    • Aiello, W.1    Ishai, Y.2    Reingold, O.3
  • 2
    • 51849139720 scopus 로고    scopus 로고
    • Ajtai, M.: Generating hard instances of lattice problems. Quaderni di Matematica 13, 1-32 (2004); Preliminary version in STOC 1996
    • Ajtai, M.: Generating hard instances of lattice problems. Quaderni di Matematica 13, 1-32 (2004); Preliminary version in STOC 1996
  • 3
    • 0030679849 scopus 로고    scopus 로고
    • A public-key cryptosystem with worst-case/average- case equivalence
    • Ajtai, M., Dwork, C.: A public-key cryptosystem with worst-case/average- case equivalence. In: STOC, pp. 284-293 (1997)
    • (1997) STOC , pp. 284-293
    • Ajtai, M.1    Dwork, C.2
  • 4
    • 38049132285 scopus 로고    scopus 로고
    • Simulatable adaptive oblivious transfer
    • Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
    • Camenisch, J., Neven, G., Shelat, A.: Simulatable adaptive oblivious transfer. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 573-590. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 573-590
    • Camenisch, J.1    Neven, G.2    Shelat, A.3
  • 5
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136-145 (2001)
    • (2001) FOCS , pp. 136-145
    • Canetti, R.1
  • 6
    • 84880897758 scopus 로고    scopus 로고
    • Universally composable commitments
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Canetti, R., Fischlin, M.: Universally composable commitments. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 19-40. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 19-40
    • Canetti, R.1    Fischlin, M.2
  • 7
    • 0036038991 scopus 로고    scopus 로고
    • Universally composable two-party and multi-party secure computation
    • Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally composable two-party and multi-party secure computation. In: STOC, pp. 494-503 (2002)
    • (2002) STOC , pp. 494-503
    • Canetti, R.1    Lindell, Y.2    Ostrovsky, R.3    Sahai, A.4
  • 8
    • 35248819315 scopus 로고    scopus 로고
    • Universal composition with joint state
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Canetti, R., Rabin, T.: Universal composition with joint state. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 265-281. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 265-281
    • Canetti, R.1    Rabin, T.2
  • 9
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Cocks, C.: An identity based encryption scheme based on quadratic residues. In: IMA Int. Conf, pp. 360-363 (2001)
    • (2001) IMA Int. Conf , pp. 360-363
    • Cocks, C.1
  • 10
    • 84947267092 scopus 로고    scopus 로고
    • Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
    • Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
    • Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 11
    • 85030121757 scopus 로고
    • Equivalence between two flavours of oblivious transfers
    • Pomerance, C, ed, CRYPTO 1987, Springer, Heidelberg
    • Crépeau, C.: Equivalence between two flavours of oblivious transfers. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 350-354. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 350-354
    • Crépeau, C.1
  • 12
    • 35248844164 scopus 로고    scopus 로고
    • Universally composable efficient multiparty computation from threshold homomorphic encryption
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Damgård, I., Nielsen, J.B.: Universally composable efficient multiparty computation from threshold homomorphic encryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 247-264. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 247-264
    • Damgård, I.1    Nielsen, J.B.2
  • 13
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637-647 (1985)
    • (1985) Commun. ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 14
    • 35048837620 scopus 로고    scopus 로고
    • Garay, J.A., MacKenzie, P.D., Yang, K.: Efficient and universally composable committed oblivious transfer and applications. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 297-316. Springer, Heidelberg (2004)
    • Garay, J.A., MacKenzie, P.D., Yang, K.: Efficient and universally composable committed oblivious transfer and applications. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 297-316. Springer, Heidelberg (2004)
  • 15
    • 51849137205 scopus 로고    scopus 로고
    • Trapdoors for hard lattices and new cryptographic constructions
    • to appear
    • Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: STOC (to appear, 2008), http://eprint.iacr.org/2007/432
    • (2008) STOC
    • Gentry, C.1    Peikert, C.2    Vaikuntanathan, V.3
  • 16
    • 0023545076 scopus 로고
    • How to play any mental game or a completeness theorem for protocols with honest majority
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229 (1987)
    • (1987) STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 17
    • 38149091799 scopus 로고    scopus 로고
    • Blind identity-based encryption and simulatable oblivious transfer
    • Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
    • Green, M., Hohenberger, S.: Blind identity-based encryption and simulatable oblivious transfer. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 265-282. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 265-282
    • Green, M.1    Hohenberger, S.2
  • 18
    • 51849126287 scopus 로고    scopus 로고
    • Universally composable adaptive oblivious transfer. Cryptology ePrint Archive, Report 2008/163
    • Green, M., Hohenberger, S.: Universally composable adaptive oblivious transfer. Cryptology ePrint Archive, Report 2008/163 (2008), http://eprint.iacr.org/
    • Green, M.1    Hohenberger, S.2
  • 19
    • 33746072569 scopus 로고    scopus 로고
    • Perfect non-interactive zero knowledge for NP
    • Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
    • Groth, J., Ostrovsky, R., Sahai, A.: Perfect non-interactive zero knowledge for NP. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 339-358. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 339-358
    • Groth, J.1    Ostrovsky, R.2    Sahai, A.3
  • 20
    • 24144457853 scopus 로고    scopus 로고
    • Extending oblivious transfers efficiently
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 145-161
    • Ishai, Y.1    Kilian, J.2    Nissim, K.3    Petrank, E.4
  • 21
    • 38049136533 scopus 로고    scopus 로고
    • Efficient two-party secure computation on committed inputs
    • Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
    • Jarecki, S., Shmatikov, V.: Efficient two-party secure computation on committed inputs. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 97-114. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 97-114
    • Jarecki, S.1    Shmatikov, V.2
  • 22
    • 24944473997 scopus 로고    scopus 로고
    • Smooth projective hashing and two-message oblivious transfer
    • Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Kalai, Y.T.: Smooth projective hashing and two-message oblivious transfer. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 78-95. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 78-95
    • Kalai, Y.T.1
  • 23
    • 84898989941 scopus 로고
    • Founding cryptography on oblivious transfer
    • Kilian, J.: Founding cryptography on oblivious transfer. In: STOC, pp. 20-31 (1988)
    • (1988) STOC , pp. 20-31
    • Kilian, J.1
  • 24
    • 40249088241 scopus 로고    scopus 로고
    • Kol, G., Naor, M.: Cryptography and game theory: Designing protocols for exchanging information. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 320-339. Springer, Heidelberg (2008)
    • Kol, G., Naor, M.: Cryptography and game theory: Designing protocols for exchanging information. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 320-339. Springer, Heidelberg (2008)
  • 25
    • 43149086402 scopus 로고    scopus 로고
    • Efficient fully simulatable oblivious transfer
    • Malkin, T, ed, CTRSA 2008, Springer, Heidelberg
    • Lindell, Y.: Efficient fully simulatable oblivious transfer. In: Malkin, T. (ed.) CTRSA 2008. LNCS, vol. 4964. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4964
    • Lindell, Y.1
  • 26
    • 38749097694 scopus 로고    scopus 로고
    • Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. SIAM J. Comput. 37(1), 267-302 (2007); Preliminary version in FOCS 2004
    • Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. SIAM J. Comput. 37(1), 267-302 (2007); Preliminary version in FOCS 2004
  • 27
    • 84957096920 scopus 로고    scopus 로고
    • Oblivious transfer with adaptive queries
    • CRYPTO, Springer, Heidelberg
    • Naor, M., Pinkas, B.: Oblivious transfer with adaptive queries. In: CRYPTO. LNCS, pp. 573-590. Springer, Heidelberg (1999)
    • (1999) LNCS , pp. 573-590
    • Naor, M.1    Pinkas, B.2
  • 29
    • 51849152661 scopus 로고    scopus 로고
    • Lossy trapdoor functions and their applications
    • to appear
    • Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. In: STOC (to appear, 2008), http://eprint.iacr.org/2007/279
    • (2008) STOC
    • Peikert, C.1    Waters, B.2
  • 30
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Technical report, Harvard University
    • Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical report, Harvard University (1981)
    • (1981)
    • Rabin, M.O.1
  • 31
    • 20444451186 scopus 로고    scopus 로고
    • New lattice-based cryptographic constructions
    • Regev, O.: New lattice-based cryptographic constructions. J. ACM 51(6), 899-942 (2004)
    • (2004) J. ACM , vol.51 , Issue.6 , pp. 899-942
    • Regev, O.1
  • 32
    • 33745571012 scopus 로고    scopus 로고
    • On lattices, learning with errors, random linear codes, and cryptography
    • Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: STOC, pp. 84-93 (2005)
    • (2005) STOC , pp. 84-93
    • Regev, O.1
  • 33
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484-1509 (1997)
    • (1997) SIAM J. Comput , vol.26 , Issue.5 , pp. 1484-1509
    • Shor, P.W.1
  • 34
    • 0022882770 scopus 로고
    • How to generate and exchange secrets (extended abstract)
    • Yao, A.C.-C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162-167 (1986)
    • (1986) FOCS , pp. 162-167
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.