메뉴 건너뛰기




Volumn 5922 LNCS, Issue , 2009, Pages 398-417

Round efficient unconditionally secure MPC and multiparty set intersection with optimal resilience

Author keywords

Error probability; Information theoretic security; Multiparty computation

Indexed keywords

ACTIVE ADVERSARY; ARITHMETIC CIRCUIT; BROADCAST CHANNELS; COMMUNICATION COMPLEXITY; COMPUTING POWER; ERROR PROBABILITIES; MULTIPARTY COMPUTATION; ON-DEMAND; OPEN PROBLEMS; OPTIMAL RESILIENCE; PRIVATE COMMUNICATION; SECURE CHANNELS; SECURE MULTI-PARTY COMPUTATION; SECURITY PARAMETERS; SET INTERSECTION; SHARED SECRETS; TECHNIQUES USED; THEORETIC MODEL;

EID: 77649259693     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10628-6_26     Document Type: Conference Paper
Times cited : (6)

References (19)
  • 1
    • 84933507780 scopus 로고
    • Efficient multiparty protocols using circuit randomization
    • Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
    • Beaver, D.: Efficient multiparty protocols using circuit randomization. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 420-432. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 420-432
    • Beaver, D.1
  • 2
    • 33745570603 scopus 로고    scopus 로고
    • Beerliová-Trubíniová, Z., Hirt, M.: Efficient multi-party computation with dispute control. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 305-328. Springer, Heidelberg (2006)
    • Beerliová-Trubíniová, Z., Hirt, M.: Efficient multi-party computation with dispute control. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 305-328. Springer, Heidelberg (2006)
  • 3
    • 38349009076 scopus 로고    scopus 로고
    • Simple and efficient perfectly-secure asynchronous MPC
    • Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
    • Beerliová-Trubíniová, Z., Hirt, M.: Simple and efficient perfectly-secure asynchronous MPC. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 376-392. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 376-392
    • Beerliová-Trubíniová, Z.1    Hirt, M.2
  • 4
    • 40349089019 scopus 로고    scopus 로고
    • Beerliová-Trubíniová, Z., Hirt, M.: Perfectly-secure MPC with linear communication complexity. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 213-230. Springer, Heidelberg (2008)
    • Beerliová-Trubíniová, Z., Hirt, M.: Perfectly-secure MPC with linear communication complexity. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 213-230. Springer, Heidelberg (2008)
  • 5
    • 84898960610 scopus 로고
    • Completeness theorems for noncryptographic fault-tolerant distributed computation
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation. In: STOC, pp. 1-10 (1988)
    • (1988) STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 6
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols (extended abstract)
    • Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols (extended abstract). In: STOC, pp. 11-19 (1988)
    • (1988) STOC , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgård, I.3
  • 7
    • 70449490535 scopus 로고    scopus 로고
    • Multiparty Computation, an Introduction
    • Birkhuser Basel
    • Cramer, R., Damgård, I.: Multiparty Computation, an Introduction. In: Contemporary Cryptography, Birkhuser Basel (2005)
    • (2005) Contemporary Cryptography
    • Cramer, R.1    Damgård, I.2
  • 8
    • 84957717648 scopus 로고    scopus 로고
    • Efficient multiparty computations secure against an adaptive adversary
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Cramer, R., Damgård, I., Dziembowski, S., Hirt, M., Rabin, T.: Efficient multiparty computations secure against an adaptive adversary. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 311-326. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 311-326
    • Cramer, R.1    Damgård, I.2    Dziembowski, S.3    Hirt, M.4    Rabin, T.5
  • 9
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 10
    • 0031628398 scopus 로고    scopus 로고
    • Simplified VSS and fact-track multiparty computations with applications to threshold cryptography
    • Gennaro, R., Rabin, M.O., Rabin, T.: Simplified VSS and fact-track multiparty computations with applications to threshold cryptography. In: PODC, pp. 101-111 (1998)
    • (1998) PODC , pp. 101-111
    • Gennaro, R.1    Rabin, M.O.2    Rabin, T.3
  • 11
  • 12
    • 0030693496 scopus 로고    scopus 로고
    • Complete characterization of adversaries tolerable in secure multi-party computation
    • Hirt, M., Maurer, U.M.: Complete characterization of adversaries tolerable in secure multi-party computation. In: PODC, pp. 25-34 (1997)
    • (1997) PODC , pp. 25-34
    • Hirt, M.1    Maurer, U.M.2
  • 13
    • 38049161810 scopus 로고    scopus 로고
    • Round-efficient secure computation in point-to-point networks
    • Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
    • Katz, J., Koo, C.Y.: Round-efficient secure computation in point-to-point networks. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 311-328. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 311-328
    • Katz, J.1    Koo, C.Y.2
  • 14
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 241-257
    • Kissner, L.1    Song, D.2
  • 15
    • 38049043364 scopus 로고    scopus 로고
    • Li, R., Wu, C.: An unconditionally secure protocol for multi-party set intersection. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, 4521, pp. 226-236. Springer, Heidelberg (2007)
    • Li, R., Wu, C.: An unconditionally secure protocol for multi-party set intersection. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 226-236. Springer, Heidelberg (2007)
  • 16
    • 58549100326 scopus 로고    scopus 로고
    • Round efficient unconditionally secure multiparty computation protocol
    • Chowdhury, D.R, Rijmen, V, Das, A, eds, INDOCRYPT 2008, Springer, Heidelberg
    • Patra, A., Choudhary, A., Rangan, C.P.: Round efficient unconditionally secure multiparty computation protocol. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 185-199. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5365 , pp. 185-199
    • Patra, A.1    Choudhary, A.2    Rangan, C.P.3
  • 17
    • 70549091142 scopus 로고    scopus 로고
    • Patra, A., Choudhary, A., Pandu Rangan, C.: Information theoretically secure multi party set intersection re-visited. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, 5867, pp. 71-91. Springer, Heidelberg (2009)
    • Patra, A., Choudhary, A., Pandu Rangan, C.: Information theoretically secure multi party set intersection re-visited. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 71-91. Springer, Heidelberg (2009)
  • 18
    • 0028542745 scopus 로고
    • Robust sharing of secrets when the dealer is honest or cheating
    • Rabin, T.: Robust sharing of secrets when the dealer is honest or cheating. J. ACM 41(6), 1089-1109 (1994)
    • (1994) J. ACM , vol.41 , Issue.6 , pp. 1089-1109
    • Rabin, T.1
  • 19
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • Yao, A.C.: Protocols for secure computations. In: FOCS, pp. 160-164 (1982)
    • (1982) FOCS , pp. 160-164
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.