메뉴 건너뛰기




Volumn , Issue , 2008, Pages 413-422

Complete fairness in secure two-party computation

Author keywords

Cryptography; Fairness; Secure computation

Indexed keywords

DESIRABLE PROPERTIES; FAIRNESS; SECURE COMPUTATION; SECURE COMPUTATIONS; SECURE PROTOCOLS; SECURITY PROPERTIES;

EID: 57049135299     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (77)

References (27)
  • 1
    • 85029542707 scopus 로고
    • Foundations of Secure Interactive Computing
    • Crypto '91, Springer-Verlag
    • D. Beaver. Foundations of Secure Interactive Computing. In Crypto '91, Springer-Verlag (LNCS 576), pages 377-391, 1991.
    • (1991) LNCS , vol.576 , pp. 377-391
    • Beaver, D.1
  • 2
    • 33746365751 scopus 로고
    • Secure Multi-Party Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority
    • D. Beaver. Secure Multi-Party Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority. Journal of Cryptology 4(2):75-122, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.2 , pp. 75-122
    • Beaver, D.1
  • 3
    • 0024769014 scopus 로고
    • Multiparty Computation with Faulty Majority
    • D. Beaver and S. Goldwasser. Multiparty Computation with Faulty Majority. In 30th FOCS, pages 468-473, 1989.
    • (1989) 30th FOCS , pp. 468-473
    • Beaver, D.1    Goldwasser, S.2
  • 4
    • 84957064831 scopus 로고    scopus 로고
    • The AU-or-Nothing Nature of Two-Party Secure Computation
    • Crypto '99, Springer-Verlag
    • A Beimel, T. Malkin, and S. Micali. The AU-or-Nothing Nature of Two-Party Secure Computation. In Crypto '99, Springer-Verlag (LNCS 1666), pages 80-97, 1999.
    • (1999) LNCS , vol.1666 , pp. 80-97
    • Beimel, A.1    Malkin, T.2    Micali, S.3
  • 5
    • 84898960610 scopus 로고
    • Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In 20th STOC, pages 1-10, 1988.
    • (1988) 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 6
    • 84974588386 scopus 로고    scopus 로고
    • Timed Commitments
    • Crypto 2000, Springer-Verlag
    • D. Boneh and M. Naor. Timed Commitments. In Crypto 2000, Springer-Verlag (LNCS 1880), pages 236-254, 2000.
    • (2000) LNCS , vol.1880 , pp. 236-254
    • Boneh, D.1    Naor, M.2
  • 7
    • 0000731055 scopus 로고    scopus 로고
    • Security and Composition of Multiparty Cryptographic Protocols
    • R. Canetti. Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology 13(1): 143-202, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 8
    • 84898947315 scopus 로고
    • Multi-party Unconditionally Secure Protocols
    • D. Chaum, C. Crépeau, and I. Damg̊ard. Multi-party Unconditionally Secure Protocols. In 20th STOC, pages 11-19, 1988.
    • (1988) 20th STOC , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damg̊ard, I.3
  • 10
    • 0012610677 scopus 로고
    • Limits on the Security of Coin Flips when Half the Processors are Faulty
    • R. Cleve. Limits on the Security of Coin Flips when Half the Processors are Faulty. In 18th STOC, pages 364-369, 1986.
    • (1986) 18th STOC , pp. 364-369
    • Cleve, R.1
  • 11
    • 0001683636 scopus 로고
    • Authenticated Algorithms for Byzantine Agreement
    • D. Dolev and H. Strong. Authenticated Algorithms for Byzantine Agreement. SIAM Journal on Computing, 12(4):656-666, 1983.
    • (1983) SIAM Journal on Computing , vol.12 , Issue.4 , pp. 656-666
    • Dolev, D.1    Strong, H.2
  • 12
  • 13
    • 84976655650 scopus 로고
    • Cryptographic Computation: Secure Fault Tolerant Protocols and the Public Key Model
    • Crypto '87, Springer-Verlag
    • Z. Galil, S. Haber, and M. Yung. Cryptographic Computation: Secure Fault Tolerant Protocols and the Public Key Model. In Crypto '87, Springer-Verlag (LNCS 293), pages 135-155, 1988.
    • (1988) LNCS , vol.293 , pp. 135-155
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 14
    • 33745536762 scopus 로고    scopus 로고
    • Resource Fairness and Composability of Cryptographic Protocols
    • 3rd TCC, Springer-Verlag
    • J. Garay, P. MacKenzie, M. Prabhakaran, and K. Yang. Resource Fairness and Composability of Cryptographic Protocols. In 3rd TCC, Springer-Verlag (LNCS 3876), pages 404-428, 2006.
    • (2006) LNCS , vol.3876 , pp. 404-428
    • Garay, J.1    MacKenzie, P.2    Prabhakaran, M.3    Yang, K.4
  • 16
    • 0023545076 scopus 로고    scopus 로고
    • O. Goldreich, S. Micali, and A. Wigderson. How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In 19th STOC, pages 218-229, 1987.
    • O. Goldreich, S. Micali, and A. Wigderson. How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In 19th STOC, pages 218-229, 1987.
  • 17
    • 84955564077 scopus 로고
    • Fair Computation of General Functions in Presence of Immoral Majority
    • Crypto '90, Springer-Verlag
    • S. Goldwasser and L. Levin. Fair Computation of General Functions in Presence of Immoral Majority. In Crypto '90, Springer-Verlag (LNCS 537), pages 77-93, 1990.
    • (1990) LNCS , vol.537 , pp. 77-93
    • Goldwasser, S.1    Levin, L.2
  • 19
    • 57049164553 scopus 로고    scopus 로고
    • J. Kilian. A General Completeness Theorem for Two-Party Games. In 23rd STOC, pages 553-560, 1991.
    • J. Kilian. A General Completeness Theorem for Two-Party Games. In 23rd STOC, pages 553-560, 1991.
  • 20
    • 0033706604 scopus 로고    scopus 로고
    • J. Kilian. More General Completeness Theorems for Secure Two-Party Computation. In 32nd STOC, pages 316-324, 2000.
    • J. Kilian. More General Completeness Theorems for Secure Two-Party Computation. In 32nd STOC, pages 316-324, 2000.
  • 21
    • 4544235438 scopus 로고    scopus 로고
    • Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
    • Y. Lindell. Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. Journal of Cryptology 16(3): 143-184, 2003.
    • (2003) Journal of Cryptology , vol.16 , Issue.3 , pp. 143-184
    • Lindell, Y.1
  • 22
    • 0020889143 scopus 로고    scopus 로고
    • M. Luby, S. Micali and C. Rackoff. How to Simultaneously Exchange a Secret Bit by Flipping a Symmetrically-Biased Coin. In 24th FOCS, pages 11-21, 1983.
    • M. Luby, S. Micali and C. Rackoff. How to Simultaneously Exchange a Secret Bit by Flipping a Symmetrically-Biased Coin. In 24th FOCS, pages 11-21, 1983.
  • 23
    • 84974655726 scopus 로고    scopus 로고
    • S. Micali and P. Rogaway. Secure Computation. Unpublished manuscript, 1992. Preliminary version in Crypto '91, Springer-Verlag (LNCS 576), pages 392-404, 1991.
    • S. Micali and P. Rogaway. Secure Computation. Unpublished manuscript, 1992. Preliminary version in Crypto '91, Springer-Verlag (LNCS 576), pages 392-404, 1991.
  • 24
    • 84976810569 scopus 로고
    • Reaching Agreement in the Presence of Faults
    • M. Pease, R. Shostak, and L. Lamport. Reaching Agreement in the Presence of Faults. Journal of the ACM 27(2):228-234, 1980.
    • (1980) Journal of the ACM , vol.27 , Issue.2 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 25
    • 35248883427 scopus 로고    scopus 로고
    • Fair Secure Two-Party Computation
    • Eurocrypt 2003, Springer-Verlag
    • B. Pinkas. Fair Secure Two-Party Computation. In Eurocrypt 2003, Springer-Verlag (LNCS 2656), pages 87-105, 2003.
    • (2003) LNCS , vol.2656 , pp. 87-105
    • Pinkas, B.1
  • 26
    • 0024859552 scopus 로고
    • Verifiable Secret Sharing and Multi-party Protocols with Honest Majority
    • T. Rabin and M. Ben-Or. Verifiable Secret Sharing and Multi-party Protocols with Honest Majority. In 21st STOC, pages 73-85, 1989.
    • (1989) 21st STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 27
    • 0022882770 scopus 로고
    • How to Generate and Exchange Secrets
    • A. Yao. How to Generate and Exchange Secrets. In 27th FOCS, pages 162-167, 1986.
    • (1986) 27th FOCS , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.