메뉴 건너뛰기




Volumn , Issue , 2008, Pages 491-500

Constructions of truly practical secure protocols using standard smartcards

Author keywords

[No Author keywords available]

Indexed keywords

DATABASE SEARCHES; GOVERNMENTAL AGENCY; PRIVATE DATA; SECURE PROTOCOLS; SET INTERSECTION; SIMULATION-BASED SECURITY;

EID: 70349276910     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1455770.1455832     Document Type: Conference Paper
Times cited : (51)

References (23)
  • 1
    • 35048875418 scopus 로고    scopus 로고
    • Secure Computation of the K'thranked Element
    • EUROCRYPT 2004, Springer-Verlag
    • G. Aggarwal, N. Mishra and B. Pinkas. Secure Computation of the K'thranked Element. In EUROCRYPT 2004, Springer-Verlag (LNCS 3027), pages 40-55, 2004.
    • (2004) LNCS , vol.3027 , pp. 40-55
    • Aggarwal, G.1    Mishra, N.2    Pinkas, B.3
  • 2
    • 38049082907 scopus 로고    scopus 로고
    • Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
    • 4th TCC, Springer-Verlag
    • Y. Aumann and Y. Lindell. Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. In 4th TCC, Springer-Verlag (LNCS 4392), pages 137-156, 2007.
    • (2007) LNCS , vol.4392 , pp. 137-156
    • Aumann, Y.1    Lindell, Y.2
  • 3
    • 85029542707 scopus 로고
    • Foundations of Secure Interactive Computing
    • CRYPTO'91, Springer-Verlag
    • D. Beaver. Foundations of Secure Interactive Computing. In CRYPTO'91, Springer-Verlag (LNCS 576), pages 377-391, 1991.
    • (1991) LNCS , vol.576 , pp. 377-391
    • Beaver, D.1
  • 4
    • 84898960610 scopus 로고
    • Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
    • M. Ben-Or, S. Goldwasser and A. Wigderson. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In 20th STOC, pages 1-10, 1988.
    • (1988) 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 5
    • 0000731055 scopus 로고    scopus 로고
    • Security and Composition of Multiparty Cryptographic Protocols
    • R. Canetti. Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology, 13(l):143-202, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.L , pp. 143-202
    • Canetti, R.1
  • 6
    • 0034782679 scopus 로고    scopus 로고
    • Selective Private Function Evaluation with Applications to Private Statistics
    • R. Canetti, Y. Ishai, R. Kumar, M.K. Reiter, R. Rubinfeld and R. Wright. Selective Private Function Evaluation with Applications to Private Statistics. In 2Mh PODC, pages 293-304, 2001.
    • (2001) 2Mh PODC , pp. 293-304
    • Canetti, R.1    Ishai, Y.2    Kumar, R.3    Reiter, M.K.4    Rubinfeld, R.5    Wright, R.6
  • 7
    • 84898947315 scopus 로고
    • Multi-party Unconditionally Secure Protocols
    • D. Chaum, C. Crepeau and I. Damgard. Multi-party Unconditionally Secure Protocols. In 20th STOC, pages 11-19, 1988.
    • (1988) 20th STOC , pp. 11-19
    • Chaum, D.1    Crepeau, C.2    Damgard, I.3
  • 8
    • 0003701129 scopus 로고    scopus 로고
    • Private Information Retrieval by Keywords
    • Technical Report TR-CS0917, Department of Computer Science, Technion
    • B. Chor, N. Gilboa, and M. Naor. Private Information Retrieval by Keywords. Technical Report TR-CS0917, Department of Computer Science, Technion, 1997.
    • (1997)
    • Chor, B.1    Gilboa, N.2    Naor, M.3
  • 10
    • 24144488603 scopus 로고    scopus 로고
    • Keyword Search and Oblivious Pseudorandom Functions
    • TCC 2005, Springer-Verlag
    • M.J. Freedman, Y. Ishai, B. Pinkas, and O. Reingold. Keyword Search and Oblivious Pseudorandom Functions. In TCC 2005, Springer-Verlag (LNCS 3378), pages 303-324, 2005.
    • (2005) LNCS , vol.3378 , pp. 303-324
    • Freedman, M.J.1    Ishai, Y.2    Pinkas, B.3    Reingold, O.4
  • 11
    • 35048820609 scopus 로고    scopus 로고
    • Efficient Private Matching and Set Intersection
    • EUROCRYPT 2004, Springer-Verlag
    • M.J. Freedman, K. Nissim and B. Pinkas. Efficient Private Matching and Set Intersection. In EUROCRYPT 2004, Springer-Verlag (LNCS 3027), pages 1-19, 2004.
    • (2004) LNCS , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 12
    • 70349270212 scopus 로고    scopus 로고
    • O. Goldreich. Foundations of Cryptography: 1 - Basic Tools. Cambridge University Press, 2001.
    • O. Goldreich. Foundations of Cryptography: Vol. 1 - Basic Tools. Cambridge University Press, 2001.
  • 14
    • 0023545076 scopus 로고
    • How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority
    • O. Goldreich, S. Micali and A. Wigderson. How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In 19th STOC, pages 218-229, 1987.
    • (1987) 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 15
    • 84955564077 scopus 로고
    • Fair Computation of General Functions in Presence of Immoral Majority
    • CRYPTO'90, Springer-Verlag
    • S. Goldwasser and L. Levin. Fair Computation of General Functions in Presence of Immoral Majority. In CRYPTO'90, Springer-Verlag (LNCS 537), pages 77-93, 1990.
    • (1990) LNCS , vol.537 , pp. 77-93
    • Goldwasser, S.1    Levin, L.2
  • 16
    • 40249108370 scopus 로고    scopus 로고
    • Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
    • Springer-Verlag
    • C. Hazay and Y. Lindell, Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In 5th TCC, Springer-Verlag , pages 155-175, 2008.
    • (2008) 5th TCC , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 17
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-Preserving Set Operations
    • CRYPTO 2005, Springer-Verlag
    • L. Kissner and D.X. Song. Privacy-Preserving Set Operations. In CRYPTO 2005, Springer-Verlag (LNCS 3621), pages 241-257, 2005.
    • (2005) LNCS , vol.3621 , pp. 241-257
    • Kissner, L.1    Song, D.X.2
  • 18
    • 33748109704 scopus 로고    scopus 로고
    • Information-Theoretically Secure Protocols and Security Under Composition
    • E. Kushilevitz, Y. Lindell and T. Rabin. Information-Theoretically Secure Protocols and Security Under Composition. In 38th STOC. pages 109-18, 2006.
    • (2006) 38th STOC , pp. 109-118
    • Kushilevitz, E.1    Lindell, Y.2    Rabin, T.3
  • 19
    • 33746437508 scopus 로고    scopus 로고
    • Y. Lindell and B. Pinkas. Privacy Preserving Data Mining. Journal of Cryptology, 15(3): 177-206, 2002. An extended abstract appeared in CRYPTO 2000.
    • Y. Lindell and B. Pinkas. Privacy Preserving Data Mining. Journal of Cryptology, 15(3): 177-206, 2002. An extended abstract appeared in CRYPTO 2000.
  • 20
    • 84974655726 scopus 로고    scopus 로고
    • S. Micali and P. Rogaway. Secure Computation. Unpublished manuscript, 1992. Preliminary version in CRYPTO'91, Springer-Verlag (LNCS 576), pages 392-404, 1991.
    • S. Micali and P. Rogaway. Secure Computation. Unpublished manuscript, 1992. Preliminary version in CRYPTO'91, Springer-Verlag (LNCS 576), pages 392-404, 1991.
  • 21
    • 0032669864 scopus 로고    scopus 로고
    • Oblivious Transfer and Polynomial Evaluation. In 31si
    • M. Naor and B. Pinkas. Oblivious Transfer and Polynomial Evaluation. In 31si STOC, pages 245-254, 1999.
    • (1999) STOC , pp. 245-254
    • Naor, M.1    Pinkas, B.2
  • 22
    • 1942521604 scopus 로고    scopus 로고
    • Advances in Smartcard Security
    • July
    • M. Witteman. Advances in Smartcard Security. Information Security Bulletin, July 2002, pages 11-22, 2002.
    • (2002) Information Security Bulletin , pp. 11-22
    • Witteman, M.1
  • 23
    • 0022882770 scopus 로고
    • How to Generate and Exchange Secrets
    • A. Yao. How to Generate and Exchange Secrets. In 27th FOCS, pages 162-167, 1986.
    • (1986) 27th FOCS , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.