메뉴 건너뛰기




Volumn 6110 LNCS, Issue , 2010, Pages 157-176

Partial fairness in secure two-party computation

Author keywords

[No Author keywords available]

Indexed keywords

POLYNOMIAL SIZE; SECURE TWO-PARTY COMPUTATIONS; STANDARD ASSUMPTIONS; TWO-PARTY COMPUTATION;

EID: 77954649870     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13190-5_8     Document Type: Conference Paper
Times cited : (54)

References (29)
  • 1
    • 38049082907 scopus 로고    scopus 로고
    • Security against covert adversaries: Efficient protocols for realistic adversaries
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Aumann, Y., Lindell, Y.: Security against covert adversaries: Efficient protocols for realistic adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137-156. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 137-156
    • Aumann, Y.1    Lindell, Y.2
  • 2
    • 85029542707 scopus 로고
    • Foundations of secure interactive computing
    • Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
    • Beaver, D.: Foundations of secure interactive computing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 377-391. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 377-391
    • Beaver, D.1
  • 6
    • 84974588386 scopus 로고    scopus 로고
    • Timed commitments
    • Bellare, M. (ed.) CRYPTO 2000. Springer, Heidelberg
    • Boneh, D., Naor, M.: Timed commitments. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 236-254. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 236-254
    • Boneh, D.1    Naor, M.2
  • 7
    • 84969520105 scopus 로고    scopus 로고
    • Optimistic fair secure computation
    • Bellare, M. (ed.) CRYPTO 2000 Springer, Heidelberg
    • Cachin, C., Camenisch, J.: Optimistic fair secure computation. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 93-111. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 93-111
    • Cachin, C.1    Camenisch, J.2
  • 8
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 143-202 (2000)
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 9
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • IEEE, Los Alamitos
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd Annual Symposium on Foundations of Computer Science (FOCS), pp. 136-145. IEEE, Los Alamitos (2001)
    • (2001) 42nd Annual Symposium on Foundations of Computer Science (FOCS) , pp. 136-145
    • Canetti, R.1
  • 10
    • 0012610677 scopus 로고
    • Limits on the security of coin flips when half the processors are faulty
    • ACM Press, New York
    • Cleve, R.: Limits on the security of coin flips when half the processors are faulty. In: 18th Annual ACM Symposium on Theory of Computing (STOC), pp. 364-369. ACM Press, New York (1986)
    • (1986) 18th Annual ACM Symposium on Theory of Computing (STOC) , pp. 364-369
    • Cleve, R.1
  • 11
    • 85032862578 scopus 로고
    • Controlled gradual disclosure schemes for random bits and their applications
    • Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
    • Cleve, R.: Controlled gradual disclosure schemes for random bits and their applications. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 573-588. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 573-588
    • Cleve, R.1
  • 12
    • 0029362450 scopus 로고
    • Practical and provably secure release of a secret and exchange of signatures
    • Damgård, I.: Practical and provably secure release of a secret and exchange of signatures. Journal of Cryptology 8(4), 201-222 (1995)
    • (1995) Journal of Cryptology , vol.8 , Issue.4 , pp. 201-222
    • Damgård, I.1
  • 13
    • 20444446289 scopus 로고    scopus 로고
    • Concurrent zero-knowledge
    • Dwork, C., Naor, M., Sahai, A.: Concurrent zero-knowledge. Journal of the ACM 51(6), 851-898 (2004)
    • (2004) Journal of the ACM , vol.51 , Issue.6 , pp. 851-898
    • Dwork, C.1    Naor, M.2    Sahai, A.3
  • 14
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Comm. ACM 28(6), 637-647 (1985)
    • (1985) Comm. ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 16
    • 84976655650 scopus 로고
    • Cryptographic computation: Secure faut-tolerant protocols and the public-key model
    • Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
    • Galil, Z., Haber, S., Yung, M.: Cryptographic computation: Secure faut-tolerant protocols and the public-key model. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 135-155. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 135-155
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 17
    • 33745536762 scopus 로고    scopus 로고
    • Resource fairness and composability of cryptographic protocols
    • Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
    • Garay, J.A., MacKenzie, P.D., Prabhakaran, M., Yang, K.: Resource fairness and composability of cryptographic protocols. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 404-428. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3876 , pp. 404-428
    • Garay, J.A.1    MacKenzie, P.D.2    Prabhakaran, M.3    Yang, K.4
  • 18
    • 33645593031 scopus 로고    scopus 로고
    • Foundations of Cryptography
    • Cambridge University Press, Cambridge
    • Goldreich, O.: Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press, Cambridge (2004)
    • (2004) Basic Applications , vol.2
    • Goldreich, O.1
  • 19
    • 33745184723 scopus 로고    scopus 로고
    • Session-key generation using human passwords only
    • DOI 10.1007/s00145-006-0233-z
    • Goldreich, O., Lindell, Y.: Session-key generation using human passwords only. Journal of Cryptology 19(3), 241-340 (2006) (Pubitemid 43911784)
    • (2006) Journal of Cryptology , vol.19 , Issue.3 , pp. 241-340
    • Goldreich, O.1    Lindell, Y.2
  • 20
    • 84955564077 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. Springer, Heidelberg
    • Goldwasser, S., Levin, L.A.: Fair computation of general functions in presence of immoral majority. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 77-93. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.537 , pp. 77-93
    • Goldwasser, S.1    Levin, L.A.2
  • 21
    • 70350630630 scopus 로고    scopus 로고
    • Complete fairness in multi-party computation without an honest majority
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Gordon, S.D., Katz, J.: Complete fairness in multi-party computation without an honest majority. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 19-35. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 19-35
    • Gordon, S.D.1    Katz, J.2
  • 23
    • 35448952561 scopus 로고    scopus 로고
    • On achieving the "best of both worlds" in secure multiparty computation
    • ACM Press, New York
    • Katz, J.: On achieving the "best of both worlds" in secure multiparty computation. In: 39th Annual ACM Symposium on Theory of Computing (STOC), pp. 11-20. ACM Press, New York (2007)
    • (2007) 39th Annual ACM Symposium on Theory of Computing (STOC) , pp. 11-20
    • Katz, J.1
  • 26
    • 84974655726 scopus 로고
    • Secure computation
    • Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
    • Micali, S., Rogaway, P.: Secure computation. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 392-404. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 27
    • 70350649064 scopus 로고    scopus 로고
    • An optimally fair coin toss
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Moran, T., Naor, M., Segev, G.: An optimally fair coin toss. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 1-18. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 1-18
    • Moran, T.1    Naor, M.2    Segev, G.3
  • 28
    • 35248883427 scopus 로고    scopus 로고
    • Fair secure two-party computation
    • Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
    • Pinkas, B.: Fair secure two-party computation. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 87-105. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 87-105
    • Pinkas, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.