메뉴 건너뛰기




Volumn 6055 LNCS, Issue , 2010, Pages 184-202

Communication efficient perfectly secure VSS and MPC in asynchronous networks with optimal resilience

Author keywords

Multiparty computation; Verifiable secret sharing

Indexed keywords

ASYNCHRONOUS NETWORKS; BYZANTINE AGREEMENT; COMMUNICATION COMPLEXITY; COMMUNICATION COST; COMPUTING POWER; DISTINCT POINTS; FINITE FIELDS; MAXIMUM VALUES; MULTIPARTY COMPUTATION; OPTIMAL RESILIENCE; TWO PHASE; VERIFIABLE SECRET SHARING;

EID: 77953525112     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-12678-9_12     Document Type: Conference Paper
Times cited : (8)

References (25)
  • 1
    • 33745570603 scopus 로고    scopus 로고
    • Efficient multi-party computation with dispute control
    • Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
    • Beerliová-Trubíniová, Z., Hirt, M.: Efficient multi-party computation with dispute control. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 305-328. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3876 , pp. 305-328
    • Beerliová-Trubíniová, Z.1    Hirt, M.2
  • 2
    • 38349009076 scopus 로고    scopus 로고
    • Simple and efficient perfectly-secure asynchronous MPC
    • Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
    • Beerliová-Trubíniová, Z., Hirt, M.: Simple and efficient perfectly-secure asynchronous MPC. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 376-392. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 376-392
    • Beerliová-Trubíniová, Z.1    Hirt, M.2
  • 3
    • 40349089019 scopus 로고    scopus 로고
    • Perfectly-secure MPC with linear communication complexity
    • Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
    • Beerliová-Trubíniová, Z., Hirt, M.: Perfectly-secure MPC with linear communication complexity. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 213-230. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4948 , pp. 213-230
    • Beerliová-Trubíniová, Z.1    Hirt, M.2
  • 4
    • 0027188428 scopus 로고
    • Asynchronous secure computation
    • Ben-Or, M., Canetti, R., Goldreich, O.: Asynchronous secure computation. In: STOC, pp. 52-61 (1993)
    • (1993) STOC , pp. 52-61
    • Ben-Or, M.1    Canetti, R.2    Goldreich, O.3
  • 5
    • 84898960610 scopus 로고
    • Completeness theorems for noncryptographic fault-tolerant distributed computation
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation. In: STOC, pp. 1-10 (1988)
    • (1988) STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 6
    • 85008184918 scopus 로고
    • Asynchronous secure computations with optimal resilience
    • BenOr, M., Kelmer, B., Rabin, T.: Asynchronous secure computations with optimal resilience. In: PODC, pp. 183-192 (1994)
    • (1994) PODC , pp. 183-192
    • BenOr, M.1    Kelmer, B.2    Rabin, T.3
  • 7
    • 0011797655 scopus 로고
    • An asynchronous ⌊(n - 1)/3⌋-resilient consensus protocol
    • Bracha, G.: An asynchronous ⌊(n - 1)/3⌋-resilient consensus protocol. In: PODC, pp. 154-162 (1984)
    • (1984) PODC , pp. 154-162
    • Bracha, G.1
  • 9
    • 0027313816 scopus 로고
    • Fast asynchronous Byzantine Agreement with optimal resilience
    • Canetti, R., Rabin, T.: Fast asynchronous Byzantine Agreement with optimal resilience. In: STOC, pp. 42-51 (1993)
    • (1993) STOC , pp. 42-51
    • Canetti, R.1    Rabin, T.2
  • 10
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols
    • extended abstract
    • Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols (extended abstract). In: STOC, pp. 11-19 (1988)
    • (1988) STOC , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgård, I.3
  • 11
    • 38049152492 scopus 로고    scopus 로고
    • Scalable and unconditionally secure multiparty computation
    • Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
    • Damgård, I., Nielsen, J.B.: Scalable and unconditionally secure multiparty computation. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 572-590. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 572-590
    • Damgård, I.1    Nielsen, J.B.2
  • 12
    • 0026985378 scopus 로고
    • Communication complexity of secure computation
    • Franklin, M.K., Yung, M.: Communication complexity of secure computation. In: STOC, pp. 699-710 (1992)
    • (1992) STOC , pp. 699-710
    • Franklin, M.K.1    Yung, M.2
  • 13
    • 77953495230 scopus 로고
    • An optimal algorithm for synchronous Byzantine Agreemet
    • Feldman, P., Micali, S.: An optimal algorithm for synchronous Byzantine Agreemet. In: STOC, pp. 639-648 (1988)
    • (1988) STOC , pp. 639-648
    • Feldman, P.1    Micali, S.2
  • 14
    • 33745550878 scopus 로고    scopus 로고
    • Round-optimal and efficient verifiable secret sharing
    • Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
    • Fitzi, M., Garay, J., Gollakota, S., Pandu Rangan, C., Srinathan, K.: Round-optimal and efficient verifiable secret sharing. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 329-342. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3876 , pp. 329-342
    • Fitzi, M.1    Garay, J.2    Gollakota, S.3    Pandu Rangan, C.4    Srinathan, K.5
  • 15
    • 0034830283 scopus 로고    scopus 로고
    • The round complexity of verifiable secret sharing and secure multicast
    • Gennaro, R., Ishai, Y., Kushilevitz, E., Rabin, T.: The round complexity of verifiable secret sharing and secure multicast. In: STOC, pp. 580-589 (2001)
    • (2001) STOC , pp. 580-589
    • Gennaro, R.1    Ishai, Y.2    Kushilevitz, E.3    Rabin, T.4
  • 16
    • 49049095073 scopus 로고    scopus 로고
    • Improving the round complexity of VSS in point-to-point networks
    • Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
    • Katz, J., Koo, C., Kumaresan, R.: Improving the round complexity of VSS in point-to-point networks. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 499-510. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5126 , pp. 499-510
    • Katz, J.1    Koo, C.2    Kumaresan, R.3
  • 17
    • 70350348919 scopus 로고    scopus 로고
    • The round complexity of verifiable secret sharing revisited
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Patra, A., Choudhary, A., Rabin, T., Pandu Rangan, C.: The round complexity of verifiable secret sharing revisited. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 487-504. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 487-504
    • Patra, A.1    Choudhary, A.2    Rabin, T.3    Pandu Rangan, C.4
  • 18
    • 77953509542 scopus 로고    scopus 로고
    • Efficient asynchronous multiparty computation with optimal resilience
    • Report 2008/425
    • Patra, A., Choudhary, A., Pandu Rangan, C.: Efficient asynchronous multiparty computation with optimal resilience. Cryptology ePrint Archive, Report 2008/425 (2008)
    • (2008) Cryptology ePrint Archive
    • Patra, A.1    Choudhary, A.2    Pandu Rangan, C.3
  • 19
    • 70350627331 scopus 로고    scopus 로고
    • Efficient asynchronous Byzantine Agreement with optimal resilience
    • Patra, A., Choudhary, A., Pandu Rangan, C.: Efficient asynchronous Byzantine Agreement with optimal resilience. In: PODC, pp. 92-101 (2009)
    • (2009) PODC , pp. 92-101
    • Patra, A.1    Choudhary, A.2    Pandu Rangan, C.3
  • 20
    • 77953492782 scopus 로고    scopus 로고
    • Unconditionally secure asynchronous multiparty computation with quadratic communication per multiplication gate
    • Report 2009/087
    • Patra, A., Choudhary, A., Pandu Rangan, C.: Unconditionally secure asynchronous multiparty computation with quadratic communication per multiplication gate. Cryptology ePrint Archive, Report 2009/087 (2009)
    • (2009) Cryptology ePrint Archive
    • Patra, A.1    Choudhary, A.2    Pandu Rangan, C.3
  • 22
    • 35248867326 scopus 로고    scopus 로고
    • Trading players for efficiency in unconditional multiparty computation
    • Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. Springer, Heidelberg
    • Prabhu, B., Srinathan, K., Pandu Rangan, C.: Trading players for efficiency in unconditional multiparty computation. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 342-353. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2576 , pp. 342-353
    • Prabhu, B.1    Srinathan, K.2    Pandu Rangan, C.3
  • 23
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: STOC, pp. 73-85 (1989)
    • (1989) STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 24
    • 84947784853 scopus 로고    scopus 로고
    • Efficient asynchronous secure multiparty distributed computation
    • Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. Springer, Heidelberg
    • Srinathan, K., Pandu Rangan, C.: Efficient asynchronous secure multiparty distributed computation. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 117-129. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1977 , pp. 117-129
    • Srinathan, K.1    Pandu Rangan, C.2
  • 25
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • Yao, A.C.: Protocols for secure computations. In: FOCS, pp. 160-164 (1982)
    • (1982) FOCS , pp. 160-164
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.