메뉴 건너뛰기




Volumn 5365 LNCS, Issue , 2008, Pages 185-199

Round efficient unconditionally secure multiparty computation protocol

Author keywords

Information theoretic security; Multiparty computation

Indexed keywords

BROADCASTING; INFORMATION THEORY;

EID: 58549100326     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-89754-5_15     Document Type: Conference Paper
Times cited : (6)

References (16)
  • 1
    • 84933507780 scopus 로고
    • Efficient multiparty protocols using circuit randomization
    • Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
    • Beaver, D.: Efficient multiparty protocols using circuit randomization. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 420-432. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 420-432
    • Beaver, D.1
  • 2
    • 33746365751 scopus 로고
    • Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
    • Beaver, D.: Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology 4(4), 75-122 (1991)
    • (1991) Journal of Cryptology , vol.4 , Issue.4 , pp. 75-122
    • Beaver, D.1
  • 3
    • 33745570603 scopus 로고    scopus 로고
    • Efficient multi-party computation with dispute control
    • Beerliová-Trubíniová, Z., Hirt, M.: Efficient multi-party computation with dispute control. In: Proc. of TCC, pp. 305-328 (2006)
    • (2006) Proc. of TCC , pp. 305-328
    • Beerliová-Trubíniová, Z.1    Hirt, M.2
  • 4
    • 40349089019 scopus 로고    scopus 로고
    • Beerliová-Trubíniová, Z., Hirt, M.: Perfectly-secure MPC with linear communication complexity. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 213-230. Springer, Heidelberg (2008)
    • Beerliová-Trubíniová, Z., Hirt, M.: Perfectly-secure MPC with linear communication complexity. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 213-230. Springer, Heidelberg (2008)
  • 5
    • 84898960610 scopus 로고
    • Completeness theorems for noncryptographic fault-tolerant distributed computation
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation. In: STOC, pp. 1-10 (1988)
    • (1988) STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 8
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols (extended abstract)
    • Chaum, D., Crpeau, C., Damgård, I.: Multiparty unconditionally secure protocols (extended abstract). In: Proc. of FOCS 1988, pp. 11-19 (1988)
    • (1988) Proc. of FOCS 1988 , pp. 11-19
    • Chaum, D.1    Crpeau, C.2    Damgård, I.3
  • 10
    • 84957717648 scopus 로고    scopus 로고
    • Efficient multiparty computations secure against an adaptive adversary
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Cramer, R., Damgård, I., Dziembowski, S., Hirt, M., Rabin, T.: Efficient multiparty computations secure against an adaptive adversary. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 311-326. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 311-326
    • Cramer, R.1    Damgård, I.2    Dziembowski, S.3    Hirt, M.4    Rabin, T.5
  • 11
    • 38049152492 scopus 로고    scopus 로고
    • Scalable and unconditionally secure multiparty computation
    • Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
    • Damgård, I., Nielsen, J.B.: Scalable and unconditionally secure multiparty computation. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 572-590. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 572-590
    • Damgård, I.1    Nielsen, J.B.2
  • 12
    • 33748676639 scopus 로고    scopus 로고
    • Fitzi, M., Hirt, M.: Optimally Efficient Multi-Valued Byzantine Agreement. In: Proc. of PODC 2006, pp. 163-168. ACM, New York (2006)
    • Fitzi, M., Hirt, M.: Optimally Efficient Multi-Valued Byzantine Agreement. In: Proc. of PODC 2006, pp. 163-168. ACM, New York (2006)
  • 13
    • 58549101194 scopus 로고    scopus 로고
    • Round Efficient Unconditionally Seecure Multiparty Computation. Cryptology ePrint Archive
    • Report 2008/399
    • Patra, A., Choudhary, A., Pandu Rangan, C.: Round Efficient Unconditionally Seecure Multiparty Computation. Cryptology ePrint Archive, Report 2008/399
    • Patra, A.1    Choudhary, A.2    Pandu Rangan, C.3
  • 14
    • 0003445668 scopus 로고    scopus 로고
    • Information-theoretic pseudosignatures and byzantine agreement for t ≥ n/3
    • Technical report, IBM Research
    • Pfitzmann, B., Waidner, M.: Information-theoretic pseudosignatures and byzantine agreement for t ≥ n/3. Technical report, IBM Research (1996)
    • (1996)
    • Pfitzmann, B.1    Waidner, M.2
  • 15
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority (extended abstract)
    • Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority (extended abstract). In: STOC, pp. 73-85 (1989)
    • (1989) STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 16
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • Yao, A.C.: Protocols for secure computations. In: Proc. of 23rd IEEE FOCS, pp. 160-164 (1982)
    • (1982) Proc. of 23rd IEEE FOCS , pp. 160-164
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.