메뉴 건너뛰기




Volumn 5867 LNCS, Issue , 2009, Pages 71-91

Information theoretically secure multi party set intersection re-visited

Author keywords

Information Theoretic Security; Multiparty Computation

Indexed keywords

ACTIVE ADVERSARY; COMMUNICATION COMPLEXITY; COMPUTING POWER; INFORMATION-THEORETIC SECURITY; MULTIPARTY COMPUTATION; NOVEL INFORMATION; SECURE PROTOCOLS; SET INTERSECTION;

EID: 70549091142     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-05445-7_5     Document Type: Conference Paper
Times cited : (8)

References (20)
  • 1
    • 33745570603 scopus 로고    scopus 로고
    • Beerliová-Trubíniová, Z., Hirt, M.: Efficient Multi-party Computation with Dispute Control. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 305-328. Springer, Heidelberg (2006)
    • Beerliová-Trubíniová, Z., Hirt, M.: Efficient Multi-party Computation with Dispute Control. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 305-328. Springer, Heidelberg (2006)
  • 2
    • 40349089019 scopus 로고    scopus 로고
    • Beerliová-Trubíniová, Z., Hirt, M.: Perfectly-Secure MPC with Linear Communication Complexity. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 213-230. Springer, Heidelberg (2008)
    • Beerliová-Trubíniová, Z., Hirt, M.: Perfectly-Secure MPC with Linear Communication Complexity. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 213-230. Springer, Heidelberg (2008)
  • 3
    • 84898960610 scopus 로고
    • Completeness Theorems for Non-Cryptographic Fault Tolerant Distributed Computation
    • ACM Press, New York
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness Theorems for Non-Cryptographic Fault Tolerant Distributed Computation. In: 20th ACM Symposium on Theory of Computing, pp. 1-10. ACM Press, New York (1988)
    • (1988) 20th ACM Symposium on Theory of Computing , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 4
    • 70549090196 scopus 로고    scopus 로고
    • Berman, P., Garay, J.A., Perry, K.J.: Bit Optimal Distributed Consensus. Comp. Sci. Research, 313-322 (1992)
    • Berman, P., Garay, J.A., Perry, K.J.: Bit Optimal Distributed Consensus. Comp. Sci. Research, 313-322 (1992)
  • 5
    • 0018456171 scopus 로고
    • Universal Classes of Hash Functions
    • Carter, L., Wegman, M.N.: Universal Classes of Hash Functions. J. of Comp. and Sys. Sci. 18(4), 143-154 (1979)
    • (1979) J. of Comp. and Sys. Sci , vol.18 , Issue.4 , pp. 143-154
    • Carter, L.1    Wegman, M.N.2
  • 7
    • 84957717648 scopus 로고    scopus 로고
    • Efficient Multiparty Computations Secure Against an Adaptive Adversary
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Cramer, R., Damgård, I., Dziembowski, S., Hirt, M., Rabin, T.: Efficient Multiparty Computations Secure Against an Adaptive Adversary. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 311-326. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 311-326
    • Cramer, R.1    Damgård, I.2    Dziembowski, S.3    Hirt, M.4    Rabin, T.5
  • 8
    • 38049152492 scopus 로고    scopus 로고
    • Scalable and Unconditionally Secure Multiparty Computation
    • Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
    • Damgård, I., Nielsen, J.B.: Scalable and Unconditionally Secure Multiparty Computation. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 572-590. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 572-590
    • Damgård, I.1    Nielsen, J.B.2
  • 9
    • 33745550878 scopus 로고    scopus 로고
    • Fitzi, M., Garay, J., Gollakota, S., Pandu Rangan, C., Srinathan, K.: Round-Optimal and Efficient Verifiable Secret Sharing. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 329-342. Springer, Heidelberg (2006)
    • Fitzi, M., Garay, J., Gollakota, S., Pandu Rangan, C., Srinathan, K.: Round-Optimal and Efficient Verifiable Secret Sharing. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 329-342. Springer, Heidelberg (2006)
  • 10
    • 35048820609 scopus 로고    scopus 로고
    • Efficient Private Matching and Set Intersection
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Freedman, M.J., Nissim, K., Pinkas, B.: Efficient Private Matching and Set Intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 12
    • 35248861868 scopus 로고    scopus 로고
    • Efficient Secure Multi-party Computation
    • Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
    • Hirt, M., Maurer, U., Przydatek, B.: Efficient Secure Multi-party Computation. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 143-161. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 143-161
    • Hirt, M.1    Maurer, U.2    Przydatek, B.3
  • 13
    • 49049095073 scopus 로고    scopus 로고
    • Improving the Round Complexity of VSS in Point-to-Point Networks
    • Aceto, L, Damgård, I, Goldberg, L.A, Halldórsson, M.M, Ingólfsdóttir, A, Walukiewicz, I, eds, ICALP 2008, Part II, Springer, Heidelberg
    • Katz, J., Koo, C.Y., Kumaresan, R.: Improving the Round Complexity of VSS in Point-to-Point Networks. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 499-510. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5126 , pp. 499-510
    • Katz, J.1    Koo, C.Y.2    Kumaresan, R.3
  • 14
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-Preserving Set Operations
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Kissner, L., Song, D.: Privacy-Preserving Set Operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 241-257
    • Kissner, L.1    Song, D.2
  • 15
    • 38049043364 scopus 로고    scopus 로고
    • Li, R., Wu, C.: An Unconditionally Secure Protocol for Multi-Party Set Intersection. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, 4521, pp. 226-236. Springer, Heidelberg (2007)
    • Li, R., Wu, C.: An Unconditionally Secure Protocol for Multi-Party Set Intersection. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 226-236. Springer, Heidelberg (2007)
  • 18
    • 0024859552 scopus 로고
    • Verifiable Secret Sharing and Multiparty Protocols with Honest Majority
    • ACM Press, New York
    • Rabin, T., Ben-Or, M.: Verifiable Secret Sharing and Multiparty Protocols with Honest Majority. In: 21st ACM Symposium on Theory of Computing, pp. 73-85. ACM Press, New York (1989)
    • (1989) 21st ACM Symposium on Theory of Computing , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 19
    • 35048814566 scopus 로고    scopus 로고
    • Optimal Perfectly Secure Message Transmission
    • Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
    • Srinathan, K., Narayanan, A., Pandu Rangan, C.: Optimal Perfectly Secure Message Transmission. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 545-561. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 545-561
    • Srinathan, K.1    Narayanan, A.2    Pandu Rangan, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.