메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1303-1307

Bootstrapped oblivious transfer and secure two-party function computation

Author keywords

[No Author keywords available]

Indexed keywords

BINARY ERASURE CHANNEL; LOWER BOUNDS; OBLIVIOUS TRANSFER;

EID: 70449482066     PISSN: 21578102     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2009.5205940     Document Type: Conference Paper
Times cited : (3)

References (11)
  • 1
    • 0020312165 scopus 로고
    • Protocols for Secure Computation
    • A. Yao, "Protocols for Secure Computation," in Proc. IEEE FOCS, 1982,pp. 160-164.
    • (1982) Proc. IEEE FOCS , pp. 160-164
    • Yao, A.1
  • 2
    • 0022080529 scopus 로고
    • A Randomized Protocol for Signing Contracts
    • S. Even, O. Goldreich, A. Lempel, "A Randomized Protocol for Signing Contracts," Commun. ACM,vol. 28, no. 6, pp. 637-647, 1985.
    • (1985) Commun. ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 3
    • 84898989941 scopus 로고
    • Founding Cryptography on Oblivious Transfer
    • Chicago, IL
    • J. Kilian, "Founding Cryptography on Oblivious Transfer," in Proc. 20th ACM Symp. Theory of Compo (STOC),Chicago, IL, 1988, pp. 20-31.
    • (1988) Proc. 20th ACM Symp. Theory of Compo (STOC) , pp. 20-31
    • Kilian, J.1
  • 4
    • 70449490535 scopus 로고    scopus 로고
    • Multiparty Computation, an Introduction
    • ser. Advanced Courses in Mathematics CRM Barcelona. Birkhäuser Basel
    • R. Cramer and I. Damgård, "Multiparty Computation, an Introduction," in Contemporary Cryptology,ser. Advanced Courses in Mathematics CRM Barcelona. Birkhäuser Basel, 2005, pp. 41-87.
    • (2005) Contemporary Cryptology , pp. 41-87
    • Cramer, R.1    Damgård, I.2
  • 5
    • 0024132071 scopus 로고
    • Achieving Oblivious Transfer using Weakened Security Assumptions
    • C. Crépeau, J. Kilian, "Achieving Oblivious Transfer using Weakened Security Assumptions," in Proc. 29th IEEE FOCS,1988, pp. 42-52.
    • (1988) Proc. 29th IEEE FOCS , pp. 42-52
    • Crépeau, C.1    Kilian, J.2
  • 6
    • 84957356475 scopus 로고    scopus 로고
    • Efficient Cryptographic Protocols Based on Noisy Channels
    • Proc. EUROCRYPT'97
    • C. Crépeau, "Efficient Cryptographic Protocols Based on Noisy Channels," in Proc. EUROCRYPT'97, LNCS,1997, pp. 306-317.
    • (1997) LNCS , pp. 306-317
    • Crépeau, C.1
  • 7
    • 23944515855 scopus 로고    scopus 로고
    • Efficient unconditional oblivious transfer from almost any noisy channel
    • Proc. 4th Conf. on Security in Comm. Networks SCN, Springer-Verlag
    • C. Crepeau, K. Morozov, and S. Wolf, "Efficient unconditional oblivious transfer from almost any noisy channel," in Proc. 4th Conf. on Security in Comm. Networks (SCN), LNCS.Springer-Verlag, 2004, pp. 47-59.
    • (2004) LNCS , pp. 47-59
    • Crepeau, C.1    Morozov, K.2    Wolf, S.3
  • 11
    • 45249089615 scopus 로고    scopus 로고
    • On the Oblivious Transfer Capacity of Noisy Resources
    • Jun
    • A. Nascimento and A. Winter, "On the Oblivious Transfer Capacity of Noisy Resources," IEEE Trans. Info. Theory,vol. IT-54, pp. 2572-2581 , Jun. 2008.
    • (2008) IEEE Trans. Info. Theory , vol.IT-54 , pp. 2572-2581
    • Nascimento, A.1    Winter, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.