메뉴 건너뛰기




Volumn 5978 LNCS, Issue , 2010, Pages 327-342

Truly efficient string oblivious transfer using resettable tamper-proof tokens

Author keywords

[No Author keywords available]

Indexed keywords

CLIENT SERVER; CONCURRENT EXECUTION; OBLIVIOUS TRANSFER; PUBLIC KEYS; SECURE STORAGE; SYMMETRIC KEYS; TAMPERPROOF;

EID: 77949599668     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-11799-2_20     Document Type: Conference Paper
Times cited : (25)

References (29)
  • 1
    • 77949623337 scopus 로고    scopus 로고
    • retrieved on August 28, 2009
    • http://www.scdeveloper.com/cards.htm (retrieved on August 28, 2009)
  • 2
    • 84945134014 scopus 로고    scopus 로고
    • Priced oblivious transfer: How to sell digital goods
    • Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
    • Aiello, W., Ishai, Y., Reingold, O.: Priced oblivious transfer: How to sell digital goods. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 119-135. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 119-135
    • Aiello, W.1    Ishai, Y.2    Reingold, O.3
  • 3
    • 38049082907 scopus 로고    scopus 로고
    • Aumann, Y., Lindell, Y.: Security against covert adversaries: Efficient protocols for realistic adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 137-156. Springer, Heidelberg (2007)
    • Aumann, Y., Lindell, Y.: Security against covert adversaries: Efficient protocols for realistic adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137-156. Springer, Heidelberg (2007)
  • 4
    • 84928743703 scopus 로고
    • Precomputing oblivious transfer
    • Coppersmith, D, ed, CRYPTO 1995, Springer, Heidelberg
    • Beaver, D.: Precomputing oblivious transfer. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 97-109. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.963 , pp. 97-109
    • Beaver, D.1
  • 5
    • 85032877753 scopus 로고
    • Non-interactive oblivious transfer and applications
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Bellare, M., Micali, S.: Non-interactive oblivious transfer and applications. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 547-557. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 547-557
    • Bellare, M.1    Micali, S.2
  • 6
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM CCS, pp. 62-73 (1993)
    • (1993) ACM CCS , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 44449151536 scopus 로고    scopus 로고
    • New constructions for uc secure computation using tamper-proof hardware
    • Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
    • Chandran, N., Goyal, V., Sahai, A.: New constructions for uc secure computation using tamper-proof hardware. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 545-562. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 545-562
    • Chandran, N.1    Goyal, V.2    Sahai, A.3
  • 8
    • 84944320484 scopus 로고    scopus 로고
    • Di Crescenzo, G.: Private selective payment protocols. In: Frankel, Y. (ed.) FC 2000. LNCS, 1962, pp. 72-89. Springer, Heidelberg (2001)
    • Di Crescenzo, G.: Private selective payment protocols. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 72-89. Springer, Heidelberg (2001)
  • 9
    • 44449160378 scopus 로고    scopus 로고
    • Isolated proofs of knowledge and isolated zero knowledge
    • Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
    • Damgå rd, I., Nielsen, J.B., Wichs, D.: Isolated proofs of knowledge and isolated zero knowledge. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 509-526. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 509-526
    • Damgå rd, I.1    Nielsen, J.B.2    Wichs, D.3
  • 10
    • 70350625407 scopus 로고    scopus 로고
    • Damgård, I., Nielsen, J.B., Wichs, D.: Universally composable multiparty computation with partially isolated parties. In: Reingold, O. (ed.) TCC 2009. LNCS, 5444, pp. 315-331. Springer, Heidelberg (2009)
    • Damgård, I., Nielsen, J.B., Wichs, D.: Universally composable multiparty computation with partially isolated parties. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 315-331. Springer, Heidelberg (2009)
  • 11
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637-647 (1985)
    • (1985) Commun. ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 12
    • 84937542853 scopus 로고    scopus 로고
    • Fischlin, M.: A cost-effective pay-per-multiplication comparison method for millionaires. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, 2020, pp. 457-471. Springer, Heidelberg (2001)
    • Fischlin, M.: A cost-effective pay-per-multiplication comparison method for millionaires. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 457-471. Springer, Heidelberg (2001)
  • 13
    • 35048896529 scopus 로고    scopus 로고
    • Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., Rabin, T.: Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 258-277. Springer, Heidelberg (2004)
    • Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., Rabin, T.: Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 258-277. Springer, Heidelberg (2004)
  • 14
    • 51849168583 scopus 로고    scopus 로고
    • One-time programs
    • Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
    • Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: One-time programs. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 39-56. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 39-56
    • Goldwasser, S.1    Kalai, Y.T.2    Rothblum, G.N.3
  • 15
    • 77949605211 scopus 로고    scopus 로고
    • Founding cryptography on tamper-proof hardware tokens
    • Micciancio, D, ed, TCC 2010, Springer, Heidelberg 2010
    • Goyal, V., Ishai, Y., Sahai, A., Venkatesan, R., Wadia, A.: Founding cryptography on tamper-proof hardware tokens. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 308-326. Springer, Heidelberg (2010)
    • LNCS , vol.5978 , pp. 308-326
    • Goyal, V.1    Ishai, Y.2    Sahai, A.3    Venkatesan, R.4    Wadia, A.5
  • 16
    • 44449160882 scopus 로고    scopus 로고
    • Efficient two party and multi party computation against covert adversaries
    • Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
    • Goyal, V., Mohassel, P., Smith, A.: Efficient two party and multi party computation against covert adversaries. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 289-306. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 289-306
    • Goyal, V.1    Mohassel, P.2    Smith, A.3
  • 17
    • 67650699638 scopus 로고    scopus 로고
    • Resettably secure computation
    • Joux, A, ed, EUROCRYPT 2009, Springer, Heidelberg
    • Goyal, V., Sahai, A.: Resettably secure computation. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 54-71. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 54-71
    • Goyal, V.1    Sahai, A.2
  • 19
    • 24144457853 scopus 로고    scopus 로고
    • Extending oblivious transfers effi-ciently
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers effi-ciently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 145-161
    • Ishai, Y.1    Kilian, J.2    Nissim, K.3    Petrank, E.4
  • 20
    • 77949597374 scopus 로고    scopus 로고
    • Järvinen, K., Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Embedded SFE: Offloading server and network using hardware tokens. In: FC 2010 (2010)
    • Järvinen, K., Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Embedded SFE: Offloading server and network using hardware tokens. In: FC 2010 (2010)
  • 21
    • 38049150653 scopus 로고    scopus 로고
    • Universally composable multi-party computation using tamper-proof hardware
    • Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
    • Katz, J.: Universally composable multi-party computation using tamper-proof hardware. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 115-128. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 115-128
    • Katz, J.1
  • 23
    • 24744472288 scopus 로고    scopus 로고
    • A proof of Yao's protocol for secure two-party computation. Cryptology ePrint Archive
    • Report 2004/175
    • Lindell, Y., Pinkas, B.: A proof of Yao's protocol for secure two-party computation. Cryptology ePrint Archive, Report 2004/175 (2004), http://eprint.iacr.org/
    • (2004)
    • Lindell, Y.1    Pinkas, B.2
  • 24
    • 38049136534 scopus 로고    scopus 로고
    • An efficient protocol for secure two-party computation in the presence of malicious adversaries
    • Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
    • Lindell, Y., Pinkas, B.: An efficient protocol for secure two-party computation in the presence of malicious adversaries. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 52-78. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 52-78
    • Lindell, Y.1    Pinkas, B.2
  • 25
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17(2), 373-386 (1988)
    • (1988) SIAM J. Comput , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 28
  • 29
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • Toronto, pp, IEEE, Los Alamitos
    • Yao, A.C.: How to generate and exchange secrets. In: Proc. 27th IEEE Symp. on Foundations of Comp. Science, Toronto, pp. 162-167. IEEE, Los Alamitos (1986)
    • (1986) Proc. 27th IEEE Symp. on Foundations of Comp. Science , pp. 162-167
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.