메뉴 건너뛰기




Volumn 5155 LNCS, Issue , 2008, Pages 86-99

Statistical security conditions for two-party secure function evaluation

Author keywords

Information theoretic security; Oblivious transfer; Secure function evaluation; Security definition

Indexed keywords

BOOLEAN FUNCTIONS; FUNCTION EVALUATION; FUNCTIONS; NETWORK PROTOCOLS; PROBABILITY DENSITY FUNCTION; RISK ASSESSMENT; STATISTICAL METHODS; TRANSFER FUNCTIONS;

EID: 54249132643     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85093-9_9     Document Type: Conference Paper
Times cited : (13)

References (26)
  • 5
    • 0001998264 scopus 로고
    • Conjugate coding
    • Wiesner, S.: Conjugate coding. SIGACT News 15(1), 78-88 (1983)
    • (1983) SIGACT News , vol.15 , Issue.1 , pp. 78-88
    • Wiesner, S.1
  • 6
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Technical Report TR-81, Harvard Aiken Computation Laboratory
    • Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computation Laboratory (1981)
    • (1981)
    • Rabin, M.O.1
  • 7
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637-647 (1985)
    • (1985) Commun. ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 8
    • 85032194875 scopus 로고
    • How to solve any protocol problem - an efficiency improvement
    • Pomerance, C, ed, CRYPTO 1987, Springer, Heidelberg
    • Goldreich, O., Vainish, R.: How to solve any protocol problem - an efficiency improvement. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 73-86. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 73-86
    • Goldreich, O.1    Vainish, R.2
  • 10
    • 85032868401 scopus 로고
    • Verifiable disclosure of secrets and applications
    • Quisquater, J.-J, Vandewalle, J, eds, EUROCRYPT 1989, Springer, Heidelberg
    • Crépeau, C.: Verifiable disclosure of secrets and applications. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 181-191. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.434 , pp. 181-191
    • Crépeau, C.1
  • 11
    • 84955564077 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • Menezes, A, Vanstone, S.A, eds, CRYPTO 1990, Springer, Heidelberg
    • Goldwasser, S., Levin, L.A.: Fair computation of general functions in presence of immoral majority. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 77-93. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.537 , pp. 77-93
    • Goldwasser, S.1    Levin, L.A.2
  • 12
    • 84957649042 scopus 로고
    • Committed oblivious transfer and private multi-party computation
    • Coppersmith, D, ed, CRYPTO 1995, Springer, Heidelberg
    • Crépeau, C., van de Graaf, J., Tapp, A.: Committed oblivious transfer and private multi-party computation. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 110-123. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.963 , pp. 110-123
    • Crépeau, C.1    van de Graaf, J.2    Tapp, A.3
  • 14
    • 84974655726 scopus 로고
    • Secure computation (abstract)
    • Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
    • Micali, S., Rogaway, P.: Secure computation (abstract). In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 392-404. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 15
    • 85029542707 scopus 로고
    • Foundations of secure interactive computing
    • Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
    • Beaver, D.: Foundations of secure interactive computing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 377-391. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 377-391
    • Beaver, D.1
  • 16
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186-208 (1989)
    • (1989) SIAM J. Comput , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 17
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 143-202 (2000)
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 18
    • 33645593031 scopus 로고    scopus 로고
    • Foundations of Cryptography
    • Cambridge University Press, Cambridge
    • Goldreich, O.: Foundations of Cryptography. Basic Applications, vol. II. Cambridge University Press, Cambridge (2004)
    • (2004) Basic Applications , vol.2
    • Goldreich, O.1
  • 21
    • 33746082048 scopus 로고    scopus 로고
    • Information-theoretic conditions for two-party secure function evaluation
    • Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
    • Crépeau, C., Savvides, G., Schaffner, C., Wullschleger, J.: Information-theoretic conditions for two-party secure function evaluation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 538-554. Springer, Heidelberg (2006), http://eprint.iacr.org/2006/183
    • (2006) LNCS , vol.4004 , pp. 538-554
    • Crépeau, C.1    Savvides, G.2    Schaffner, C.3    Wullschleger, J.4
  • 23
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • Shannon, C.E.: A mathematical theory of communication. Bell System Tech. Journal 27, 379-423 (1948)
    • (1948) Bell System Tech. Journal , vol.27 , pp. 379-423
    • Shannon, C.E.1
  • 26
    • 0016993685 scopus 로고
    • A constructive proof of the brouwer fixed-point theorem and computational results
    • Kellogg, R.B., Li, T.Y., Yorke, J.: A constructive proof of the brouwer fixed-point theorem and computational results. SIAM Journal on Numerical Analysis 13(4), 473-483 (1976)
    • (1976) SIAM Journal on Numerical Analysis , vol.13 , Issue.4 , pp. 473-483
    • Kellogg, R.B.1    Li, T.Y.2    Yorke, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.