메뉴 건너뛰기




Volumn 5143 LNCS, Issue , 2008, Pages 98-112

Generalized non-interactive oblivious transfer using count-limited objects with applications to secure mobile agents

Author keywords

[No Author keywords available]

Indexed keywords

AGENT PROTOCOLS; CRYPTOGRAPHIC PRIMITIVES; CRYPTOGRAPHIC PROTOCOLS; FORMAL PROOFS; IMPROVING EFFICIENCIES; INTERACTIVE; MOBILE AGENT APPLICATIONS; OBLIVIOUS TRANSFERS; SECURE FUNCTION EVALUATIONS; SECURE MOBILE AGENTS; SECURITY GUARANTEES; TRUSTED PLATFORM MODULES;

EID: 54249137843     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85230-8_8     Document Type: Conference Paper
Times cited : (17)

References (15)
  • 1
    • 24944516264 scopus 로고    scopus 로고
    • Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
    • Cramer, R.J.F, ed, EURO CRYPT 2005, Springer, Heidelberg
    • Abe, M., Gennaro, R., Kurosawa, K., Shoup, V.: Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. In: Cramer, R.J.F. (ed.) EURO CRYPT 2005. LNCS, vol. 3494, pp. 128-146. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 128-146
    • Abe, M.1    Gennaro, R.2    Kurosawa, K.3    Shoup, V.4
  • 3
    • 85032877753 scopus 로고
    • Non-interactive oblivious transfer and applications
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Bellare, M., Micali, S.: Non-interactive oblivious transfer and applications. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 547-557. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 547-557
    • Bellare, M.1    Micali, S.2
  • 4
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 33(1), 167-226 (2003)
    • (2003) SIAM J. Comput , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 5
    • 34247232660 scopus 로고    scopus 로고
    • Gunupudi, V., Tate, S.R.: SAgent: A Security Framework for JADE. In: AAMAS 2006: Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, pp. 1116-1118 (2006)
    • Gunupudi, V., Tate, S.R.: SAgent: A Security Framework for JADE. In: AAMAS 2006: Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, pp. 1116-1118 (2006)
  • 7
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Tech. Rep. TR-81, Harvard University
    • Rabin, M.O.: How to exchange secrets by oblivious transfer. Tech. Rep. TR-81, Harvard University (1981)
    • (1981)
    • Rabin, M.O.1
  • 10
    • 50949106225 scopus 로고    scopus 로고
    • Master's thesis, Eidgenossische Technische Hochschule ETH, Zurich, Project web page
    • Strasser, M., Sevnic, P.E.: A software-based TPM emulator for Linux. Master's thesis, Eidgenossische Technische Hochschule (ETH), Zurich, Project web page (2005), http://developer.berlios.de/projects/tpm-emulator/
    • (2005) A software-based TPM emulator for Linux
    • Strasser, M.1    Sevnic, P.E.2
  • 12
    • 54249170266 scopus 로고    scopus 로고
    • Trusted Computing Group
    • Trusted Computing Group, http://www.trustedcomputinggroup.org
  • 13
    • 54249098837 scopus 로고    scopus 로고
    • Trusted Computing Group. TPM main specification, version 1.2, revision 103, parts 1-3 (2007), http://www.trustedcomputinggroup.org
    • Trusted Computing Group. TPM main specification, version 1.2, revision 103, parts 1-3 (2007), http://www.trustedcomputinggroup.org
  • 14
    • 35048823067 scopus 로고    scopus 로고
    • Xu, K., Tate, S.R.: Universally composable secure mobile agent computation. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, 3225, pp. 304-317. Springer, Heidelberg (2004)
    • Xu, K., Tate, S.R.: Universally composable secure mobile agent computation. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 304-317. Springer, Heidelberg (2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.