메뉴 건너뛰기




Volumn , Issue , 2003, Pages 609-613

Arithmetic circuit for the first solution of distributed CSPs with cryptographic multi-party computations

Author keywords

[No Author keywords available]

Indexed keywords

ARITHMETIC CIRCUIT; BASIC SOLUTIONS; CONSTRAINT SATISFACTION PROBLEMS; DISTRIBUTED CONSTRAINT SATISFACTION; LARGE CLASS; MEETING SCHEDULING; MULTIPARTY COMPUTATION; SECRET SHARING SCHEMES; THRESHOLD SCHEMES;

EID: 78649710259     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (2)

References (11)
  • 2
    • 0022914590 scopus 로고
    • Proofs that yield nothing but their validity and a methodology of cryptographic protocol design
    • Toronto
    • O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design. In Proc. of 27th IEEE FOCS, pages 174-187, Toronto, 1986.
    • (1986) Proc. of 27th IEEE FOCS , pp. 174-187
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 3
    • 35248861868 scopus 로고
    • Efficient secure multi-party computation
    • Advances in Cryptology - ASIACRYPT'OO
    • M. Hirt, U. Maurer, and B. Przydatek. Efficient secure multi-party computation. In Advances in Cryptology - ASIACRYPT'OO, volume 1976 of LNCS, pages 143-161, 2000.
    • (1976) LNCS , pp. 143-161
    • Hirt, M.1    Maurer, U.2    Przydatek, B.3
  • 5
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Comm. of the ACM, 22:612-613, 1979.
    • (1979) Comm. of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 6
    • 15544376515 scopus 로고    scopus 로고
    • Solving a distributed csp with cryptographic multi-party computations, without revealing constraints and without involving trusted servers
    • M. Silaghi. Solving a distributed csp with cryptographic multi-party computations, without revealing constraints and without involving trusted servers. In IJCAI-DCR, 2003.
    • IJCAI-DCR, 2003
    • Silaghi, M.1
  • 7
    • 15544363599 scopus 로고    scopus 로고
    • A comparison of DisCSP algorithms with respect to privacy
    • M. C. Silaghi and B. Faltings. A comparison of DisCSP algorithms with respect to privacy. In AAMAS-DCR, 2002.
    • AAMAS-DCR, 2002
    • Silaghi, M.C.1    Faltings, B.2
  • 8
    • 0033727048 scopus 로고    scopus 로고
    • Asynchronous search with private constraints
    • Barcelona, June
    • M.-C. Silaghi, D. Sam-Haroud, and B. Faltings. Asynchronous search with private constraints. In Proc. of AA2000, pages 177-178, Barcelona, June 2000.
    • (2000) Proc. of AA2000 , pp. 177-178
    • Silaghi, M.-C.1    Sam-Haroud, D.2    Faltings, B.3
  • 9
    • 10044232541 scopus 로고    scopus 로고
    • Constraint-based multi-agent meeting scheduling: Effects of agent heterogeneity on performance and privacy loss
    • R. Wallace and E. Freuder. Constraint-based multi-agent meeting scheduling: Effects of agent heterogeneity on performance and privacy loss. In DCR, pages 176-182, 2002.
    • (2002) DCR , pp. 176-182
    • Wallace, R.1    Freuder, E.2
  • 10
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • A. Yao. Protocols for secure computations. In FOCS, pages 160-164, 1982.
    • (1982) FOCS , pp. 160-164
    • Yao, A.1
  • 11
    • 4544364879 scopus 로고    scopus 로고
    • Secure distributed constraint satisfaction: Reaching agreement without revealing private information
    • M. Yokoo, K. Suzuki, and K. Hirayama. Secure distributed constraint satisfaction: Reaching agreement without revealing private information. In CP, 2002.
    • CP, 2002
    • Yokoo, M.1    Suzuki, K.2    Hirayama, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.