메뉴 건너뛰기




Volumn 5628 LNCS, Issue , 2009, Pages 90-107

Solving linear programs using multiparty computation

Author keywords

Linear programming; Multiparty computation; Secure collaboration

Indexed keywords

BLACK BOXES; INPUT DATAS; LINEAR PROGRAMS; MODULO ARITHMETIC; MULTIPARTY COMPUTATION; PRIVACY PRESERVING; SECURE COLLABORATION; SIMPLEX METHODS; TWO-PARTY PROTOCOLS;

EID: 70350349546     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03549-4_6     Document Type: Conference Paper
Times cited : (41)

References (26)
  • 2
    • 84898960610 scopus 로고
    • Completeness theorems for noncryptographic fault-tolerant distributed computations
    • ACM Press, New York
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computations. In: 20th Annual ACM Symposium on Theory of Computing, pp. 1-10. ACM Press, New York (1988)
    • (1988) 20th Annual ACM Symposium on Theory of Computing , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 5
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty computation from threshold homomorphic encryption
    • Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
    • Cramer, R., Damgård, I., Nielsen, J.: Multiparty computation from threshold homomorphic encryption. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 280-300. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 280-300
    • Cramer, R.1    Damgård, I.2    Nielsen, J.3
  • 7
    • 33745567199 scopus 로고    scopus 로고
    • Damgård, I., Fitzi, M., Kiltz, E., Nielsen, J., Toft, T.: Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 285-304. Springer, Heidelberg (2006)
    • Damgård, I., Fitzi, M., Kiltz, E., Nielsen, J., Toft, T.: Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 285-304. Springer, Heidelberg (2006)
  • 8
    • 84867553981 scopus 로고    scopus 로고
    • Damgård, I., Jurik, M.: A generalization, a simplification and some applications of Paillier's probabilistic public-key system. In: Kim, K.-c. (ed.) PKC 2001. LNCS, 1992, pp. 110-136. Springer, Heidelberg (2001)
    • Damgård, I., Jurik, M.: A generalization, a simplification and some applications of Paillier's probabilistic public-key system. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 110-136. Springer, Heidelberg (2001)
  • 9
    • 35248844164 scopus 로고    scopus 로고
    • Universally composable efficient multiparty computation from threshold homomorphic encryption
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Damgård, I., Nielsen, J.: Universally composable efficient multiparty computation from threshold homomorphic encryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 247-264. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 247-264
    • Damgård, I.1    Nielsen, J.2
  • 11
    • 70350404135 scopus 로고    scopus 로고
    • Fouque, P., Stern, J., Wackers, G.: CryptoComputing with rationals. In: Financial Cryptography 2002. LNCS. Springer, Berlin (2002)
    • Fouque, P., Stern, J., Wackers, G.: CryptoComputing with rationals. In: Financial Cryptography 2002. LNCS. Springer, Berlin (2002)
  • 13
    • 70350369347 scopus 로고
    • Linear programming
    • October
    • Goemans, M.: Linear programming. Course notes (October 1994), http://www-math.mit.edu/~goemans/notes-lp.ps
    • (1994) Course notes
    • Goemans, M.1
  • 15
    • 51249181779 scopus 로고
    • A new polynomial-time algorithm for linear programming
    • Karmarkar, N.: A new polynomial-time algorithm for linear programming. Combinatorica 4(4), 373-395 (1984)
    • (1984) Combinatorica , vol.4 , Issue.4 , pp. 373-395
    • Karmarkar, N.1
  • 16
    • 0000564361 scopus 로고
    • A polynomial algorithm in linear programming
    • Khachiyan, L.: A polynomial algorithm in linear programming. Soviet Mathematics Doklady 20 (1979)
    • (1979) Soviet Mathematics Doklady , vol.20
    • Khachiyan, L.1
  • 18
    • 38049034355 scopus 로고    scopus 로고
    • Nishide, T., Ohta, K.: Multiparty computation for interval, equality, and comparison without bit-decomposition protocol. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, 4450, pp. 343-360. Springer, Heidelberg (2007)
    • Nishide, T., Ohta, K.: Multiparty computation for interval, equality, and comparison without bit-decomposition protocol. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 343-360. Springer, Heidelberg (2007)
  • 19
    • 38449097356 scopus 로고    scopus 로고
    • Nielsen, K., Toft, T.: Secure relative performance scheme. In: Deng, X., Graham, F.C. (eds.) WINE 2007. LNCS, 4858, pp. 396-403. Springer, Heidelberg (2007)
    • Nielsen, K., Toft, T.: Secure relative performance scheme. In: Deng, X., Graham, F.C. (eds.) WINE 2007. LNCS, vol. 4858, pp. 396-403. Springer, Heidelberg (2007)
  • 20
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 21
    • 67650390554 scopus 로고    scopus 로고
    • Enumeration of all extreme equlibria of bimatrix games with integer pivoting and improved degeneracy check
    • LSE-CDAM-2005-18
    • Rosenberg, G.: Enumeration of all extreme equlibria of bimatrix games with integer pivoting and improved degeneracy check, CDAM Research Report LSE-CDAM-2005-18 (2005), http://www.cdam.lse.ac.uk/Reports/Abstracts/cdam-2005- 18.html
    • (2005) CDAM Research Report
    • Rosenberg, G.1
  • 22
    • 67049151991 scopus 로고    scopus 로고
    • Secret sharing comparison by transformation and rotation
    • Proceedings of the International Conference on Information Theoretic Security (ICITS, Springer, Heidelberg , to appear
    • Reistad, T., Toft, T.: Secret sharing comparison by transformation and rotation. In: Proceedings of the International Conference on Information Theoretic Security (ICITS) 2007. LNCS. Springer, Heidelberg (2007) (to appear)
    • (2007) LNCS
    • Reistad, T.1    Toft, T.2
  • 23
    • 84864569795 scopus 로고    scopus 로고
    • Secure combinatorial optimization simulating dfs tree-based variable elimination
    • Silaghi, M., Faltings, B., Petcu, A.: Secure combinatorial optimization simulating dfs tree-based variable elimination. In: AI and Math 2006 Proceedings (2006), http://anytime.cs.umass.edu/aimath06/proceedings.html
    • (2006) AI and Math 2006 Proceedings
    • Silaghi, M.1    Faltings, B.2    Petcu, A.3
  • 24
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612-613 (1979)
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 25
    • 70350355967 scopus 로고    scopus 로고
    • A suite of secure multi-party computation algorithms for solving distributed constraint satisfaction and optimization problems
    • Technical Report CS-2004-04, Florida Institute of Technology
    • Silaghi, M.: A suite of secure multi-party computation algorithms for solving distributed constraint satisfaction and optimization problems. Technical Report CS-2004-04, Florida Institute of Technology (2004)
    • (2004)
    • Silaghi, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.