메뉴 건너뛰기




Volumn 5978 LNCS, Issue , 2010, Pages 128-145

From passive to covert security at low cost

Author keywords

[No Author keywords available]

Indexed keywords

LOW COSTS; REAL-WORLD; SECURE PROTOCOLS;

EID: 77949608607     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-11799-2_9     Document Type: Conference Paper
Times cited : (18)

References (16)
  • 1
    • 84937431456 scopus 로고    scopus 로고
    • Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Algesheimer, J., Camenisch, J., Shoup, V.: Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 417-432. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 417-432
    • Algesheimer, J.1    Camenisch, J.2    Shoup, V.3
  • 2
    • 38049082907 scopus 로고    scopus 로고
    • Aumann, Y., Lindell, Y.: Security against covert adversaries: Efficient protocols for realistic adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 137-156. Springer, Heidelberg (2007)
    • Aumann, Y., Lindell, Y.: Security against covert adversaries: Efficient protocols for realistic adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137-156. Springer, Heidelberg (2007)
  • 4
    • 17744381610 scopus 로고    scopus 로고
    • Universally composable protocols with relaxed set-up assumptions. In: FOCS
    • Los Alamitos
    • Barak, B., Canetti, R., Nielsen, J.B., Pass, R.: Universally composable protocols with relaxed set-up assumptions. In: FOCS, pp. 186-195. IEEE Computer Society, Los Alamitos (2004)
    • (2004) IEEE Computer Society , pp. 186-195
    • Barak, B.1    Canetti, R.2    Nielsen, J.B.3    Pass, R.4
  • 5
    • 40349089019 scopus 로고    scopus 로고
    • Beerliová-Trubi8́niová, Z., Hirt, M.: Perfectly-secure MPC with linear communication complexity. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 213-230. Springer, Heidelberg (2008)
    • Beerliová-Trubi8́niová, Z., Hirt, M.: Perfectly-secure MPC with linear communication complexity. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 213-230. Springer, Heidelberg (2008)
  • 6
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract)
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In: STOC, pp. 1-10 (1988)
    • (1988) STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 7
    • 33748117259 scopus 로고    scopus 로고
    • Berman, P., Garay, J.A., Perry, K.J.: Optimal early stopping in distributed consensus. In: Segall, A., Zaks, S. (eds.) WDAG 1992. LNCS, 647, pp. 221-237. Springer, Heidelberg (1992)
    • Berman, P., Garay, J.A., Perry, K.J.: Optimal early stopping in distributed consensus. In: Segall, A., Zaks, S. (eds.) WDAG 1992. LNCS, vol. 647, pp. 221-237. Springer, Heidelberg (1992)
  • 8
    • 70350379222 scopus 로고    scopus 로고
    • Bogetoft, P., Christensen, D.L., Damgård, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M.I., Toft, T.: Secure multiparty computation goes live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, 5628, pp. 325-343. Springer, Heidelberg (2009)
    • Bogetoft, P., Christensen, D.L., Damgård, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M.I., Toft, T.: Secure multiparty computation goes live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 325-343. Springer, Heidelberg (2009)
  • 9
    • 0035163054 scopus 로고    scopus 로고
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136-145. IEEE, Los Alamitos (2001)
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136-145. IEEE, Los Alamitos (2001)
  • 10
    • 38049152492 scopus 로고    scopus 로고
    • Scalable and unconditionally secure multiparty computation
    • Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
    • Damgård, I., Nielsen, J.B.: Scalable and unconditionally secure multiparty computation. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 572-590. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 572-590
    • Damgård, I.1    Nielsen, J.B.2
  • 11
    • 84937437506 scopus 로고    scopus 로고
    • Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Damgård, I.B., Nielsen, J.B.: Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 581-596. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 581-596
    • Damgård, I.B.1    Nielsen, J.B.2
  • 12
    • 51849125042 scopus 로고    scopus 로고
    • Scalable multiparty computation with nearly optimal work and resilience
    • Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
    • Damgård, I., Ishai, Y., Krøigaard, M., Nielsen, J.B., Smith, A.: Scalable multiparty computation with nearly optimal work and resilience. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 241-261. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 241-261
    • Damgård, I.1    Ishai, Y.2    Krøigaard, M.3    Nielsen, J.B.4    Smith, A.5
  • 13
    • 77949577082 scopus 로고    scopus 로고
    • From passive to covert security at low cost. Cryptology ePrint Archive
    • Report 2009/592
    • Damgård, I., Geisler, M., Nielsen, J.B.: From passive to covert security at low cost. Cryptology ePrint Archive, Report 2009/592 (2009), http://eprint.iacr.org/
    • (2009)
    • Damgård, I.1    Geisler, M.2    Nielsen, J.B.3
  • 14
    • 0023545076 scopus 로고    scopus 로고
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229. ACM, New York (1987)
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229. ACM, New York (1987)
  • 15
    • 44449160882 scopus 로고    scopus 로고
    • Efficient two party and multi party computation against covert adversaries
    • Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
    • Goyal, V., Mohassel, P., Smith, A.: Efficient two party and multi party computation against covert adversaries. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 289-306. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 289-306
    • Goyal, V.1    Mohassel, P.2    Smith, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.