메뉴 건너뛰기




Volumn 5443, Issue , 2009, Pages 160-179

Asynchronous multiparty computation: Theory and implementation

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTER PROGRAMMING; PUBLIC KEY CRYPTOGRAPHY;

EID: 67049134126     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00468-1_10     Document Type: Conference Paper
Times cited : (175)

References (14)
  • 1
    • 67049153665 scopus 로고    scopus 로고
    • Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, May 2-4, 1988, Chicago, Illinois, USA. ACM (1988)
    • Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, May 2-4, 1988, Chicago, Illinois, USA. ACM (1988)
  • 2
    • 40349089019 scopus 로고    scopus 로고
    • Beerliova-Trubmiova, Z., Hirt, M.: Perfectly-secure MPC with linear communication complexity. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 213-230. Springer, Heidelberg (2008)
    • Beerliova-Trubmiova, Z., Hirt, M.: Perfectly-secure MPC with linear communication complexity. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 213-230. Springer, Heidelberg (2008)
  • 4
    • 84898960610 scopus 로고    scopus 로고
    • Completeness theorems for non- cryptographic fault-tolerant distributed computation
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non- cryptographic fault-tolerant distributed computation. In: STOC [1], pp. 1-10
    • STOC , vol.1 , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 5
    • 67049091542 scopus 로고    scopus 로고
    • Bogetoft, P., Christensen, D.L., Damgard, I., Geisler, M., Jakobsen, T., Kr0igaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Multiparty computation goes live. Cryptology ePrint Archive, Report 2008/068 (2008), http://eprint.iacr.org/
    • Bogetoft, P., Christensen, D.L., Damgard, I., Geisler, M., Jakobsen, T., Kr0igaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Multiparty computation goes live. Cryptology ePrint Archive, Report 2008/068 (2008), http://eprint.iacr.org/
  • 6
    • 0035163054 scopus 로고    scopus 로고
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136-145. IEEE, Los Alamitos (2001)
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136-145. IEEE, Los Alamitos (2001)
  • 7
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols
    • Chaum, D., Crepeau, C., Damgard, I.: Multiparty unconditionally secure protocols. In: STOC [1], pp. 11-19 (1988)
    • (1988) STOC , vol.1 , pp. 11-19
    • Chaum, D.1    Crepeau, C.2    Damgard, I.3
  • 8
    • 21144458613 scopus 로고    scopus 로고
    • Cramer, R., Damgard, I.B., Ishai, Y.: Share conversion, pseudorandom secret- sharing and applications to secure computation. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 342-362. Springer, Heidelberg (2005)
    • Cramer, R., Damgard, I.B., Ishai, Y.: Share conversion, pseudorandom secret- sharing and applications to secure computation. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 342-362. Springer, Heidelberg (2005)
  • 9
    • 21144458613 scopus 로고    scopus 로고
    • Cramer, R., Damgard, I.B., Ishai, Y.: Share conversion, pseudorandom secret- sharing and applications to secure computation. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 342-362. Springer, Heidelberg (2005)
    • Cramer, R., Damgard, I.B., Ishai, Y.: Share conversion, pseudorandom secret- sharing and applications to secure computation. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 342-362. Springer, Heidelberg (2005)
  • 10
    • 0023545076 scopus 로고    scopus 로고
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229. ACM, New York (1987)
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229. ACM, New York (1987)
  • 11
    • 84880854377 scopus 로고    scopus 로고
    • Robustness for free in unconditional multi-party computation
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Hirt, M., Maurer, U.M.: Robustness for free in unconditional multi-party computation. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 101-118. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 101-118
    • Hirt, M.1    Maurer, U.M.2
  • 12
    • 49049092824 scopus 로고    scopus 로고
    • Asynchronous multi-party computation with quadratic communication
    • Aceto, L, Damgard, I, Goldberg, L.A, Halldorsson, M.M, Ingolfsdottir, A, Walukiewicz, I, eds, ICALP 2008, Part II, Springer, Heidelberg
    • Hirt, M., Nielsen, J.B., Przydatek, B.: Asynchronous multi-party computation with quadratic communication. In: Aceto, L., Damgard, I., Goldberg, L.A., Halldorsson, M.M., Ingolfsdottir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 473-485. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5126 , pp. 473-485
    • Hirt, M.1    Nielsen, J.B.2    Przydatek, B.3
  • 13
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 14
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612-613 1979)
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.