메뉴 건너뛰기




Volumn 6223 LNCS, Issue , 2010, Pages 538-557

Protocols for multiparty coin toss with dishonest majority

Author keywords

[No Author keywords available]

Indexed keywords

BUILDING BLOCKES; COIN-TOSSING PROTOCOL; CRYPTOGRAPHIC PROTOCOLS; UNIFORM DISTRIBUTION;

EID: 77956987124     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14623-7_29     Document Type: Conference Paper
Times cited : (42)

References (14)
  • 1
    • 38049082907 scopus 로고    scopus 로고
    • Security against covert adversaries: Efficient protocols for realistic adversaries
    • Vadhan, S.P. (ed.) LNCS Springer, Heidelberg
    • Aumann, Y., Lindell, Y.: Security against covert adversaries: Efficient protocols for realistic adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137-156. Springer, Heidelberg (2007)
    • (2007) TCC 2007 , vol.4392 , pp. 137-156
    • Aumann, Y.1    Lindell, Y.2
  • 3
    • 17744380057 scopus 로고
    • Coin flipping by telephone a protocol for solving impossible problems
    • Blum, M.: Coin flipping by telephone a protocol for solving impossible problems. SIGACT News 15(1), 23-27 (1983)
    • (1983) SIGACT News , vol.15 , Issue.1 , pp. 23-27
    • Blum, M.1
  • 4
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. on Computing 13, 850-864 (1984)
    • (1984) SIAM J. on Computing , vol.13 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 5
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • Canetti, R.: Security and composition of multiparty cryptographic protocols. J. of Cryptology 13(1), 143-202 (2000)
    • (2000) J. of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 6
    • 0012610677 scopus 로고
    • Limits on the security of coin flips when half the processors are faulty
    • Cleve, R.: Limits on the security of coin flips when half the processors are faulty. In: Proc. of the 18th STOC, pp. 364-369 (1986)
    • (1986) Proc. of the 18th STOC , pp. 364-369
    • Cleve, R.1
  • 10
    • 35448952561 scopus 로고    scopus 로고
    • On achieving the "best of both worlds" in secure multiparty computation
    • ACM Press, New York
    • Katz, J.: On achieving the "best of both worlds" in secure multiparty computation. In: Proc. of the 39th STOC, pp. 11-20. ACM Press, New York (2007)
    • (2007) Proc. of the 39th STOC , pp. 11-20
    • Katz, J.1
  • 11
    • 4544235438 scopus 로고    scopus 로고
    • Parallel coin-tossing and constant-round secure two-party computation
    • Lindell, Y.: Parallel coin-tossing and constant-round secure two-party computation. J. of Cryptology 16(3), 143-184 (2003)
    • (2003) J. of Cryptology , vol.16 , Issue.3 , pp. 143-184
    • Lindell, Y.1
  • 12
    • 70350649064 scopus 로고    scopus 로고
    • An optimally fair coin toss
    • Reingold, O. (ed.) LNCS Springer, Heidelberg
    • Moran, T., Naor, M., Segev, G.: An optimally fair coin toss. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 1-18. Springer, Heidelberg (2009)
    • (2009) TCC 2009 , vol.5444 , pp. 1-18
    • Moran, T.1    Naor, M.2    Segev, G.3
  • 13
    • 4544250511 scopus 로고    scopus 로고
    • Bounded-concurrent secure multi-party computation with a dishonest majority
    • Pass, R.: Bounded-concurrent secure multi-party computation with a dishonest majority. In: Proc. of the 36th STOC, pp. 232-241 (2004)
    • (2004) Proc. of the 36th STOC , pp. 232-241
    • Pass, R.1
  • 14
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: Proc. of the 21st STOC, pp. 73-85 (1989)
    • (1989) Proc. of the 21st STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.