메뉴 건너뛰기




Volumn 6280 LNCS, Issue , 2010, Pages 182-199

Improved primitives for secure multiparty integer computation

Author keywords

secret sharing; secure comparison; secure integer arithmetic; Secure multiparty computation

Indexed keywords

BUILDING BLOCKES; COMPLEX APPLICATIONS; FIXED-POINT COMPUTATION; HIGHER-LEVEL PROTOCOLS; INTEGER ARITHMETIC; MULTI-PARTY COMPUTATION PROTOCOLS; MULTIPARTY COMPUTATION; PERFORMANCE BOTTLENECKS; PERFORMANCE REQUIREMENTS; SECRET SHARING; SECURE COMPARISON; SECURE COMPUTATION; SECURE MULTI-PARTY COMPUTATION;

EID: 77958074910     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15317-4_13     Document Type: Conference Paper
Times cited : (137)

References (25)
  • 1
    • 84958748475 scopus 로고    scopus 로고
    • Non-interactive distributed-verifier proofs and proving relations among commitments
    • Zheng, Y. (ed.) Springer, Heidelberg
    • Abe, M., Cramer, R., Fehr, S.: Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 206-223. Springer, Heidelberg (2002)
    • (2002) ASIACRYPT 2002. LNCS , vol.2501 , pp. 206-223
    • Abe, M.1    Cramer, R.2    Fehr, S.3
  • 2
    • 84937431456 scopus 로고    scopus 로고
    • Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
    • Yung, M. (ed.) Springer, Heidelberg
    • Algesheimer, J., Camenish, J., Shoup, V.: Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 417-432. Springer, Heidelberg (2002)
    • (2002) CRYPTO 2002. LNCS , vol.2442 , pp. 417-432
    • Algesheimer, J.1    Camenish, J.2    Shoup, V.3
  • 4
    • 0024940038 scopus 로고
    • Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction
    • ACM, New York
    • Bar-Ilan, J., Beaver, D.: Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction. In: Proc. 8th ACM Symposium on Principles of Distributed Computing, pp. 201-209. ACM, New York (1989)
    • (1989) Proc. 8th ACM Symposium on Principles of Distributed Computing , pp. 201-209
    • Bar-Ilan, J.1    Beaver, D.2
  • 6
    • 77955328311 scopus 로고    scopus 로고
    • Secure computation with fixed-point numbers
    • Sion, R. (ed.) Springer, Heidelberg
    • Catrina, O., Saxena, A.: Secure computation with fixed-point numbers. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 35-50. Springer, Heidelberg (2010)
    • FC 2010. LNCS , vol.6052 , Issue.2010 , pp. 35-50
    • Catrina, O.1    Saxena, A.2
  • 7
    • 21144458613 scopus 로고    scopus 로고
    • Share conversion, pseudorandom secret-sharing and applications to secure computation
    • Kilian, J. (ed.) Springer, Heidelberg
    • Cramer, R., Damg°ard, I., Ishai, Y.: Share conversion, pseudorandom secret-sharing and applications to secure computation. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 342-362. Springer, Heidelberg (2005)
    • (2005) TCC 2005. LNCS , vol.3378 , pp. 342-362
    • Cramer, R.1    Damgard, I.2    Ishai, Y.3
  • 8
    • 84948975649 scopus 로고    scopus 로고
    • General secure multi-party computation from any linear secret-sharing scheme
    • Preneel, B. (ed.) Springer, Heidelberg
    • Cramer, R., Damg°ard, I., Maurer, U.: General Secure Multi-Party Computation from any Linear Secret-Sharing Scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 316-334. Springer, Heidelberg (2000)
    • (2000) EUROCRYPT 2000. LNCS , vol.1807 , pp. 316-334
    • Cramer, R.1    Damgard, I.2    Maurer, U.3
  • 9
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty computation from threshold homomorphic encryption
    • Pfitzmann, B. (ed.) Springer, Heidelberg
    • Cramer, R., Damg°ard, I., Nielsen, J.: Multiparty computation from threshold homomorphic encryption. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 280-300. Springer, Heidelberg (2001)
    • (2001) EUROCRYPT 2001. LNCS , vol.2045 , pp. 280-300
    • Cramer, R.1    Damgard, I.2    Nielsen, J.3
  • 10
    • 84957375076 scopus 로고    scopus 로고
    • A secure and optimally efficient multi-authority election scheme
    • Advances in Cryptology - Eurocrypt '97
    • Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103-118. Springer, Heidelberg (1997) (Pubitemid 127067797)
    • (1997) LNCS , Issue.1233 , pp. 103-118
    • Cramer, R.1    Gennaro, R.2    Schoenmakers, B.3
  • 11
    • 33745567199 scopus 로고    scopus 로고
    • Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and ex-ponentiation
    • Halevi, S., Rabin, T. (eds.) Springer, Heidelberg
    • Damg°ard, I., Fitzi, M., Kiltz, E., Nielsen, J., Toft, T.: Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and ex-ponentiation. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 285-304. Springer, Heidelberg (2006)
    • (2006) TCC 2006. LNCS , vol.3876 , pp. 285-304
    • Damgard, I.1    Fitzi, M.2    Kiltz, E.3    Nielsen, J.4    Toft, T.5
  • 12
    • 33750056675 scopus 로고    scopus 로고
    • A practical implementation of secure auctions based on multiparty integer computation
    • Di Crescenzo, G., Rubin, A. (eds.) Springer, Heidelberg
    • Damg°ard, I., Nielsen, J., Toft, T., Pagter, J.I., Jakobsen, T., Bogetoft, P., Nielsen, K.: A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 142-147. Springer, Heidelberg (2006)
    • (2006) FC 2006. LNCS , vol.4107 , pp. 142-147
    • Damgard, I.1    Nielsen, J.2    Toft, T.3    Pagter, J.I.4    Jakobsen, T.5    Bogetoft, P.6    Nielsen, K.7
  • 13
    • 38049103274 scopus 로고    scopus 로고
    • Non-interactive proofs for integer multiplication
    • Naor, M. (ed.) Springer, Heidelberg
    • Damg°ard, I., Thorbek, R.: Non-interactive Proofs for Integer Multiplication. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 412-429. Springer, Heidelberg (2007)
    • (2007) EUROCRYPT 2007. LNCS , vol.4515 , pp. 412-429
    • Damgard, I.1    Thorbek, R.2
  • 15
    • 38049064946 scopus 로고    scopus 로고
    • Practical and secure solutions for integer comparison
    • Okamoto, T., Wang, X. (eds.) Springer, Heidelberg
    • Garay, J., Schoenmakers, B., Villegas, J.: Practical and Secure Solutions for Integer Comparison. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 330-342. Springer, Heidelberg (2007)
    • (2007) PKC 2007. LNCS , vol.4450 , pp. 330-342
    • Garay, J.1    Schoenmakers, B.2    Villegas, J.3
  • 17
    • 77955339189 scopus 로고    scopus 로고
    • Modulo reduction for paillier en-cryptions and application to secure statistical analysis
    • Sion, R. (ed.) Springer, Heidelberg
    • Guajardo, J., Mennink, B., Schoenmakers, B.: Modulo reduction for paillier en-cryptions and application to secure statistical analysis. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 375-382. Springer, Heidelberg (2010)
    • FC 2010. LNCS , vol.6052 , Issue.2010 , pp. 375-382
    • Guajardo, J.1    Mennink, B.2    Schoenmakers, B.3
  • 18
    • 55549095165 scopus 로고    scopus 로고
    • Building a privacy-preserving benchmarking enterprise system
    • Kerschbaum, F.: Building a privacy-preserving benchmarking enterprise system. Enterp. Inf. Syst. 2(4), 421-441 (2008)
    • (2008) Enterp. Inf. Syst. , vol.2 , Issue.4 , pp. 421-441
    • Kerschbaum, F.1
  • 19
    • 38049034355 scopus 로고    scopus 로고
    • Multiparty computation for interval, equality, and com-parison without bit-decomposition protocol
    • Okamoto, T., Wang, X. (eds.) Springer, Heidelberg
    • Nishide, T., Ohta, K.: Multiparty Computation for Interval, Equality, and Com-parison Without Bit-Decomposition Protocol. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 343-360. Springer, Heidelberg (2007)
    • (2007) PKC 2007. LNCS , vol.4450 , pp. 343-360
    • Nishide, T.1    Ohta, K.2
  • 21
    • 33746092442 scopus 로고    scopus 로고
    • Efficient binary conversion for paillier encryptions
    • Vaudenay, S. (ed.) Springer, Heidelberg
    • Schoenmakers, B., Tuyls, P.: Efficient Binary Conversion for Paillier Encryptions. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 522-537. Springer, Heidelberg (2006)
    • (2006) EUROCRYPT 2006. LNCS , vol.4004 , pp. 522-537
    • Schoenmakers, B.1    Tuyls, P.2
  • 22
    • 77958036925 scopus 로고    scopus 로고
    • SecureSCM EU FP7 Project Secure Supply Chain Management, SecureSCM
    • SecureSCM. Security Analysis. Deliverable D9.2, EU FP7 Project Secure Supply Chain Management, SecureSCM (2009)
    • (2009) Security Analysis. Deliverable D9.2
  • 25
    • 70350349546 scopus 로고    scopus 로고
    • Solving linear programs using multiparty computation
    • Dingledine, R., Golle, P. (eds.) Springer, Heidelberg
    • Toft, T.: Solving Linear Programs Using Multiparty Computation. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 90-107. Springer, Heidelberg (2009)
    • (2009) FC 2009. LNCS , vol.5628 , pp. 90-107
    • Toft, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.