메뉴 건너뛰기




Volumn , Issue , 2009, Pages 325-330

Multiparty comparison: An improved multiparty protocol for comparison of secret-shared values

Author keywords

Comparison, Information hiding; Multiparty; Secret sharing

Indexed keywords

INFORMATION HIDING; MULTI-PARTY PROTOCOLS; SECRET SHARING; SECRET SHARING SCHEMES; SHARED VALUES;

EID: 74549175152     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (12)
  • 1
    • 0024940038 scopus 로고
    • Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction
    • Rudnicki, P, editor, New York. ACM Press
    • Bar-Ilan, J. and Beaver, D. (1989). Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction. In Rudnicki, P., editor, Proceedings of the eighth annual ACM Symposium on Principles of distributed computing, pages 201-209, New York. ACM Press.
    • (1989) Proceedings of the eighth annual ACM Symposium on Principles of distributed computing , pp. 201-209
    • Bar-Ilan, J.1    Beaver, D.2
  • 3
    • 74549120501 scopus 로고    scopus 로고
    • Bogetoft, P., Christensen, D., Dåmgard, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J., Nielsen, J., Nielsen, K., Pagter, J., Schwartzbach, M., and Toft, T. (2008). Multi-party computation goes live. Cryptology ePrint Archive, Report 2008/068.
    • Bogetoft, P., Christensen, D., Dåmgard, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J., Nielsen, J., Nielsen, K., Pagter, J., Schwartzbach, M., and Toft, T. (2008). Multi-party computation goes live. Cryptology ePrint Archive, Report 2008/068.
  • 4
    • 47949096726 scopus 로고    scopus 로고
    • Secure computing, economy, and trust: A generic solution for secure auctions with real-world applications
    • RS-05-18, BRICS
    • Bogetoft, P., Damgård, I., Jakobsen, T., Nielsen, K., Pagter, J., and Toft, T. (2005). Secure computing, economy, and trust: A generic solution for secure auctions with real-world applications. BRICS Report Series RS-05-18, BRICS. http://www.brics.dk/RS/05/18/.
    • (2005) BRICS Report Series
    • Bogetoft, P.1    Damgård, I.2    Jakobsen, T.3    Nielsen, K.4    Pagter, J.5    Toft, T.6
  • 5
    • 33745567199 scopus 로고    scopus 로고
    • Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
    • Halevi, S. and Rabin, T, editors, Theory of Cryptography, of, Springer
    • Damgård, I., Fitzi, M., Kiltz, E., Nielsen, J., and Toft, T. (2006). Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In Halevi, S. and Rabin, T., editors, Theory of Cryptography, volume 3876 of Lecture Notes in Computer Science (LNCS), pages 285-304. Springer.
    • (2006) Lecture Notes in Computer Science , vol.3876 , pp. 285-304
    • Damgård, I.1    Fitzi, M.2    Kiltz, E.3    Nielsen, J.4    Toft, T.5
  • 6
    • 84937542853 scopus 로고    scopus 로고
    • A cost-effective pay-per-multiplication comparison method for millionaires
    • Naccache, D, editor, Topics in Cryptology, CT-RSA 2001, of, Springer-Verlag, Berlin, Germany
    • Fischlin, M. (2001). A cost-effective pay-per-multiplication comparison method for millionaires. In Naccache, D., editor, Topics in Cryptology - CT-RSA 2001, volume 2020 of Lecture Notes in Computer Science, pages 457-471. Springer-Verlag, Berlin, Germany.
    • (2001) Lecture Notes in Computer Science , vol.2020 , pp. 457-471
    • Fischlin, M.1
  • 8
    • 38049034355 scopus 로고    scopus 로고
    • Multiparty computation for interval, equality, and comparison without bit-decomposition protocol
    • PKC 2007 International Workshop on Theory and Practice in Public Key Cryptography, Springer-Verlag, Berlin, Germany
    • Nishide, T. and Ohta, K. (2007). Multiparty computation for interval, equality, and comparison without bit-decomposition protocol. In PKC 2007 International Workshop on Theory and Practice in Public Key Cryptography, Lecture Notes in Computer Science. Springer-Verlag, Berlin, Germany.
    • (2007) Lecture Notes in Computer Science
    • Nishide, T.1    Ohta, K.2
  • 10
    • 35048828873 scopus 로고    scopus 로고
    • Practical two-party computation based on the conditional gate
    • Lee, P. J, editor, Advances in Cryptology, ASIACRYPT 2004, of, Springer-Verlag, Berlin, Germany
    • Schoenmakers, B. and Tuyls, P. (2004). Practical two-party computation based on the conditional gate. In Lee, P. J., editor, Advances in Cryptology - ASIACRYPT 2004, volume 3329 of Lecture Notes in Computer Science, pages 119-136. Springer-Verlag, Berlin, Germany.
    • (2004) Lecture Notes in Computer Science , vol.3329 , pp. 119-136
    • Schoenmakers, B.1    Tuyls, P.2
  • 11
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11):612-613.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.