메뉴 건너뛰기




Volumn 5157 LNCS, Issue , 2008, Pages 481-496

Efficient secure linear algebra in the presence of covert or computationally unbounded adversaries

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION COMPLEXITIES; CRYPTOLOGY; LINEAR ALGEBRA PROBLEMS; SECURE PROTOCOLS; UPPER BOUNDS;

EID: 52049092094     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85174-5_27     Document Type: Conference Paper
Times cited : (14)

References (26)
  • 1
    • 38049082907 scopus 로고    scopus 로고
    • Aumann, Y., Lindell, Y.: Security against covert adversaries: Efficient protocols for realistic adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 137-156. Springer, Heidelberg (2007)
    • Aumann, Y., Lindell, Y.: Security against covert adversaries: Efficient protocols for realistic adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137-156. Springer, Heidelberg (2007)
  • 3
    • 84898960610 scopus 로고
    • Completeness theorems for noncryptographic fault-tolerant distributed computations
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computations. In: STOC, pp. 1-10 (1988)
    • (1988) STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 4
    • 84983014125 scopus 로고
    • Fast solution of Toeplitz systems of equations and computation of pade approximants
    • Brent, R.P., Gustavson, F.G., Yun, D.Y.Y.: Fast solution of Toeplitz systems of equations and computation of pade approximants. J. Algorithms, 259-295 (1980)
    • (1980) J. Algorithms , pp. 259-295
    • Brent, R.P.1    Gustavson, F.G.2    Yun, D.Y.Y.3
  • 5
    • 0024940038 scopus 로고    scopus 로고
    • Bar-Ilan, J., Beaver, D.: Non-cryptographic fault-tolerant computing in constant number of rounds of interaction. In: PODC, pp. 201-209. ACM Press, New York (1989)
    • Bar-Ilan, J., Beaver, D.: Non-cryptographic fault-tolerant computing in constant number of rounds of interaction. In: PODC, pp. 201-209. ACM Press, New York (1989)
  • 6
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols
    • Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols. In: STOC, pp. 11-19 (1988)
    • (1988) STOC , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgård, I.3
  • 7
    • 84880872502 scopus 로고    scopus 로고
    • Secure distributed linear algebra in a constant number of rounds
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Cramer, R., Damgaard, I.: Secure distributed linear algebra in a constant number of rounds. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 119-136. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 119-136
    • Cramer, R.1    Damgaard, I.2
  • 8
    • 84948975649 scopus 로고    scopus 로고
    • General secure multi-party computation from any linear secret-sharing scheme
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Cramer, R., Damgård, I., Maurer, U.: General secure multi-party computation from any linear secret-sharing scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 316-334. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 316-334
    • Cramer, R.1    Damgård, I.2    Maurer, U.3
  • 9
    • 38049184750 scopus 로고    scopus 로고
    • A note on secure computation of the Moore-Penrose pseudo-inverse and its application to secure linear algebra
    • Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
    • Cramer, R., Kiltz, E., Padró, C.: A note on secure computation of the Moore-Penrose pseudo-inverse and its application to secure linear algebra. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, p. 613. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 613
    • Cramer, R.1    Kiltz, E.2    Padró, C.3
  • 11
    • 0003046567 scopus 로고
    • New inversion formulas for matrices classified in terms of their distance from Toeplitz matrices
    • Friedlander, B., Morf, M., Kailath, T., Ljung, L.: New inversion formulas for matrices classified in terms of their distance from Toeplitz matrices. Linear Algebra and Appl. 27, 31-60 (1979)
    • (1979) Linear Algebra and Appl , vol.27 , pp. 31-60
    • Friedlander, B.1    Morf, M.2    Kailath, T.3    Ljung, L.4
  • 12
  • 13
    • 0001726473 scopus 로고
    • On the inversion of finite Toeplitz matrices and their continuous analogs
    • Gohberg, I., Semencul, A.: On the inversion of finite Toeplitz matrices and their continuous analogs. Math. Issl., 201-233 (1972)
    • (1972) Math. Issl , pp. 201-233
    • Gohberg, I.1    Semencul, A.2
  • 15
    • 33748109704 scopus 로고    scopus 로고
    • Information-theoretically secure protocols and security under composition
    • Kushilevitz, E., Lindell, Y., Rabin, T.: Information-theoretically secure protocols and security under composition. In: STOC, pp. 109-118 (2006)
    • (2006) STOC , pp. 109-118
    • Kushilevitz, E.1    Lindell, Y.2    Rabin, T.3
  • 16
    • 38049077335 scopus 로고    scopus 로고
    • Kiltz, E., Mohassel, P., Weinreb, E., Franklin, M.: Secure linear algebra using linearly recurrent sequences. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 291-310. Springer, Heidelberg (2007)
    • Kiltz, E., Mohassel, P., Weinreb, E., Franklin, M.: Secure linear algebra using linearly recurrent sequences. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 291-310. Springer, Heidelberg (2007)
  • 17
    • 85058940739 scopus 로고    scopus 로고
    • Kaltofen, E., Pan, V.: Processor efficient parallel solution of linear systems over an abstract field. In: SPAA, pp. 180-191. ACM Press, New York (1991)
    • Kaltofen, E., Pan, V.: Processor efficient parallel solution of linear systems over an abstract field. In: SPAA, pp. 180-191. ACM Press, New York (1991)
  • 18
    • 84968495217 scopus 로고    scopus 로고
    • Kaltofen, E., Saunders, D.: On Wiedemann's method of solving sparse linear systems. In: AAECC-9, London, UK, pp. 29-38 (1991)
    • Kaltofen, E., Saunders, D.: On Wiedemann's method of solving sparse linear systems. In: AAECC-9, London, UK, pp. 29-38 (1991)
  • 19
    • 33745567199 scopus 로고    scopus 로고
    • Damgaard, I., Fitzi, M., Kiltz, E., Nielsen, J.B., Toft, T.: Unconditionally Secure Constant-Rounds Multi-Party Computation for Equality, Comparison, Bits and Exponentiation. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 285-304. Springer, Heidelberg (2006)
    • Damgaard, I., Fitzi, M., Kiltz, E., Nielsen, J.B., Toft, T.: Unconditionally Secure Constant-Rounds Multi-Party Computation for Equality, Comparison, Bits and Exponentiation. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 285-304. Springer, Heidelberg (2006)
  • 20
    • 35048833033 scopus 로고    scopus 로고
    • Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Lindell, Y.: Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 171-189. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 171-189
    • Lindell, Y.1
  • 21
    • 33745868262 scopus 로고    scopus 로고
    • Mohassel, P., Franklin, M.: Efficient Polynomial Operations in the Shared-Coefficient Setting. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, 3958, pp. 44-57. Springer, Heidelberg (2006)
    • Mohassel, P., Franklin, M.: Efficient Polynomial Operations in the Shared-Coefficient Setting. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 44-57. Springer, Heidelberg (2006)
  • 22
    • 33745558215 scopus 로고    scopus 로고
    • Nissim, K., Weinreb, E.: Communication efficient secure linear algebra. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 522-541. Springer, Heidelberg (2006)
    • Nissim, K., Weinreb, E.: Communication efficient secure linear algebra. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 522-541. Springer, Heidelberg (2006)
  • 23
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Pallier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Pallier, P.1
  • 24
    • 0022583143 scopus 로고
    • Solving sparse linear equations over finite fields
    • Wiedemann, D.H.: Solving sparse linear equations over finite fields. IEEE Trans. Inf. Theor. 32(1), 54-62 (1986)
    • (1986) IEEE Trans. Inf. Theor , vol.32 , Issue.1 , pp. 54-62
    • Wiedemann, D.H.1
  • 25
    • 0020312165 scopus 로고    scopus 로고
    • Yao,A.C.:Protocolsforsecurecomputations.In:FOCS,pp.160-164(1982)
    • Yao,A.C.:Protocolsforsecurecomputations.In:FOCS,pp.160-164(1982)
  • 26
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • Yao, A.C.: How to generate and exchange secrets. In: FOCS, pp. 162-167 (1986)
    • (1986) FOCS , pp. 162-167
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.