메뉴 건너뛰기




Volumn 40, Issue 1, 2011, Pages 122-141

On achieving the "best of both worlds" in secure multiparty computation

Author keywords

Secure computation; Theory of cryptography

Indexed keywords

ARBITRARY NUMBER; SECURE COMPUTATION; SECURE MULTI-PARTY COMPUTATION; THEORY OF CRYPTOGRAPHY;

EID: 79952946379     PISSN: 00975397     EISSN: None     Source Type: Journal    
DOI: 10.1137/100783224     Document Type: Article
Times cited : (28)

References (22)
  • 1
    • 38049082907 scopus 로고    scopus 로고
    • Security against covert adversaries: Efficient protocols for realistic adversaries
    • Lecture Notes in Comput. Sci. 4392, Springer, Berlin
    • Y. Aumann and Y. Lindell, Security against covert adversaries: Efficient protocols for realistic adversaries, in Proceedings of the 4th Annual Theory of Cryptography Conference (TCC 2007), Lecture Notes in Comput. Sci. 4392, Springer, Berlin, 2007, pp. 137-156.
    • (2007) Proceedings of the 4th Annual Theory of Cryptography Conference (TCC 2007) , pp. 137-156
    • Aumann, Y.1    Lindell, Y.2
  • 2
    • 85032862464 scopus 로고
    • Multiparty protocols tolerating half faulty processors
    • Lecture Notes in Comput. Sci. 435, Springer- Verlag, New York
    • D. Beaver, Multiparty protocols tolerating half faulty processors, in Advances in Cryptology (Crypto'89), Lecture Notes in Comput. Sci. 435, Springer-Verlag, New York, 1990, pp. 560-572.
    • (1990) Advances in Cryptology (Crypto'89) , pp. 560-572
    • Beaver, D.1
  • 5
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti, Security and composition of multiparty cryptographic protocols, J. Cryptology, 13 (2000), pp. 143-202.
    • (2000) J. Cryptology , vol.13 , pp. 143-202
    • Canetti, R.1
  • 6
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • R. Canetti, Universally composable security: A new paradigm for cryptographic protocols, in Proceedings of the 42nd Annual Symposium on Foundations of Computer Science (FOCS), IEEE, Piscataway, NJ, 2001, pp. 136-145. (Pubitemid 33068374)
    • (2001) Annual Symposium on Foundations of Computer Science - Proceedings , pp. 136-145
    • Canetti, R.1
  • 7
    • 78751492310 scopus 로고    scopus 로고
    • Security and composition of cryptographic protocols: A tutorial (part I)
    • R. Canetti, Security and composition of cryptographic protocols: A tutorial (part I), SIGACT News, 37 (2006), pp. 67-92.
    • (2006) SIGACT News , vol.37 , pp. 67-92
    • Canetti, R.1
  • 10
    • 84957717648 scopus 로고    scopus 로고
    • Efficient multiparty computations secure against an adaptive adversary
    • Lecture Notes in Comput. Sci. 1592, Springer- Verlag, Berlin
    • R. Cramer, I. Damgård, S. Dziembowski, M. Hirt, and T. Rabin, Efficient multiparty computations secure against an adaptive adversary, in Advances in Cryptology (Eurocrypt'99), Lecture Notes in Comput. Sci. 1592, Springer-Verlag, Berlin, 1999, pp. 311-326.
    • (1999) Advances in Cryptology (Eurocrypt'99) , pp. 311-326
    • Cramer, R.1    Damgard, I.2    Dziembowski, S.3    Hirt, M.4    Rabin, T.5
  • 13
    • 84955564077 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • Lecture Notes in Comput. Sci. 537, Springer- Verlag, Berlin
    • S. Goldwasser and L. A. Levin, Fair computation of general functions in presence of immoral majority, in Advances in Cryptology (Crypto'90), Lecture Notes in Comput. Sci. 537, Springer-Verlag, Berlin, 1991, pp. 77-93.
    • (1991) Advances in Cryptology (Crypto'90) , pp. 77-93
    • Goldwasser, S.1    Levin, L.A.2
  • 14
    • 22344432877 scopus 로고    scopus 로고
    • Secure multi-party computation without agreement
    • DOI 10.1007/s00145-005-0319-z
    • S. Goldwasser and Y. Lindell, Secure multiparty computation without agreement, J. Cryptology, 18 (2005), pp. 247-287. (Pubitemid 40997661)
    • (2005) Journal of Cryptology , vol.18 , Issue.3 , pp. 247-287
    • Goldwasser, S.1    Lindell, Y.2
  • 16
    • 70350630630 scopus 로고    scopus 로고
    • Complete fairness in multiparty computation without an honest majority
    • Lecture Notes in Comput. Sci. 5444, Springer, Berlin
    • S. D. Gordon and J. Katz, Complete fairness in multiparty computation without an honest majority, in Proceedings of the 6th Annual Theory of Cryptography Conference (TCC 2009), Lecture Notes in Comput. Sci. 5444, Springer, Berlin, 2009, pp. 19-35.
    • (2009) Proceedings of the 6th Annual Theory of Cryptography Conference (TCC 2009) , pp. 19-35
    • Gordon, S.D.1    Katz, J.2
  • 17
    • 77954649870 scopus 로고    scopus 로고
    • Partial fairness in secure two-party computation
    • Lecture Notes in Comput. Sci. 6110, Springer, Berlin
    • S. D. Gordon and J. Katz, Partial fairness in secure two-party computation, in Advances in Cryptology (Eurocrypt 2010), Lecture Notes in Comput. Sci. 6110, Springer, Berlin, 2010, pp. 157-176.
    • (2010) Advances in Cryptology (Eurocrypt 2010) , pp. 157-176
    • Gordon, S.D.1    Katz, J.2
  • 19
    • 35448952561 scopus 로고    scopus 로고
    • On achieving the "best of both worlds" in secure multiparty computation
    • DOI 10.1145/1250790.1250793, STOC'07: Proceedings of the 39th Annual ACM Symposium on Theory of Computing
    • J. Katz, On achieving the "best of both worlds" in secure multiparty computation, in Proceedings of the 39th Annual ACM Symposium on Theory of Computing (STOC), ACM Press, New York, 2007, pp. 11-20. (Pubitemid 47630716)
    • (2007) Proceedings of the Annual ACM Symposium on Theory of Computing , pp. 11-20
    • Katz, J.1
  • 21
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, How to share a secret, Comm. ACM, 22 (1979), pp. 612-613.
    • (1979) Comm. ACM , vol.22 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.