메뉴 건너뛰기




Volumn 6597 LNCS, Issue , 2011, Pages 486-503

Exploring the limits of common coins using frontier analysis of protocols

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; INFORMATION THEORY; RANDOM PROCESSES;

EID: 79953197899     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19571-6_29     Document Type: Conference Paper
Times cited : (5)

References (21)
  • 1
    • 33746028196 scopus 로고
    • Perfect privacy for two-party protocols
    • Feigenbaum, J., Merritt, M. (eds.) American Mathematical Society, Providence
    • Beaver, D.: Perfect privacy for two-party protocols. In: Feigenbaum, J., Merritt, M. (eds.) Proceedings of DIMACS Workshop on Distributed Computing and Cryptography, vol. 2, pp. 65-77. American Mathematical Society, Providence (1989)
    • (1989) Proceedings of DIMACS Workshop on Distributed Computing and Cryptography , vol.2 , pp. 65-77
    • Beaver, D.1
  • 2
    • 84928743703 scopus 로고
    • Precomputing oblivious transfer
    • Coppersmith, D. (ed.) CRYPTO 1995. Springer, Heidelberg
    • Beaver, D.: Precomputing oblivious transfer. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 97-109. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.963 , pp. 97-109
    • Beaver, D.1
  • 3
    • 0003153237 scopus 로고
    • Non-interactive zero-knowledge and its applications (extended abstract)
    • ACM, New York
    • Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications (extended abstract). In: STOC, pp. 103-112. ACM, New York (1988)
    • (1988) STOC , pp. 103-112
    • Blum, M.1    Feldman, P.2    Micali, S.3
  • 5
    • 83755165101 scopus 로고    scopus 로고
    • A unified framework for analyzing security of protocols
    • Previous version availabe at the ECCC archive TR01-016, Extended abstract in
    • Previous version "A unified framework for analyzing security of protocols" availabe at the ECCC archive TR01-016, Extended abstract in FOCS 2001
    • FOCS 2001
  • 6
    • 0036038991 scopus 로고    scopus 로고
    • Universally composable two-party computation
    • ACM, New York
    • Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally composable two-party computation. In: Proc. 34th STOC, pp. 494-503. ACM, New York (2002)
    • (2002) Proc. 34th STOC , pp. 494-503
    • Canetti, R.1    Lindell, Y.2    Ostrovsky, R.3    Sahai, A.4
  • 7
    • 0024860209 scopus 로고
    • A zero-one law for boolean privacy
    • (extended abstract). ACM, New York
    • Chor, B., Kushilevitz, E.: A zero-one law for boolean privacy (extended abstract). In: STOC, pp. 62-72. ACM, New York (1989)
    • (1989) STOC , pp. 62-72
    • Chor, B.1    Kushilevitz, E.2
  • 8
    • 0012610677 scopus 로고
    • Limits on the security of coin flips when half the processors are faulty
    • (extended abstract). ACM, New York
    • Cleve, R.: Limits on the security of coin flips when half the processors are faulty (extended abstract). In: STOC, pp. 364-369. ACM, New York (1986)
    • (1986) STOC , pp. 364-369
    • Cleve, R.1
  • 10
    • 79953173362 scopus 로고    scopus 로고
    • On the necessary and sufficient assumptions for UC computation
    • Report 2009/247
    • Damgård, I., Nielsen, J.B., Orlandi, C.: On the necessary and sufficient assumptions for UC computation. Cryptology ePrint Archive, Report 2009/247 (2009), http://eprint.iacr.org/
    • (2009) Cryptology EPrint Archive
    • Damgård, I.1    Nielsen, J.B.2    Orlandi, C.3
  • 11
    • 0024770898 scopus 로고
    • One-way functions are essential for complexity based cryptography
    • IEEE, Los Alamitos
    • Impagliazzo, R., Luby, M.: One-way functions are essential for complexity based cryptography. In: Proc. 30th FOCS, pp. 230-235. IEEE, Los Alamitos (1989)
    • (1989) Proc. 30th FOCS , pp. 230-235
    • Impagliazzo, R.1    Luby, M.2
  • 12
    • 0033706604 scopus 로고    scopus 로고
    • More general completeness theorems for secure two-party computation
    • ACM, New York
    • Kilian, J.: More general completeness theorems for secure two-party computation. In: Proc. 32th STOC, pp. 316-324. ACM, New York (2000)
    • (2000) Proc. 32th STOC , pp. 316-324
    • Kilian, J.1
  • 13
    • 70350657209 scopus 로고    scopus 로고
    • Secure computability of functions in the it setting with dishonest majority and applications to long-term security
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Künzler, R., Müller-Quade, J., Raub, D.: Secure computability of functions in the it setting with dishonest majority and applications to long-term security. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 238-255. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 238-255
    • Künzler, R.1    Müller-Quade, J.2    Raub, D.3
  • 14
    • 0024768184 scopus 로고
    • Privacy and communication complexity
    • IEEE, Los Alamitos
    • Kushilevitz, E.: Privacy and communication complexity. In: FOCS, pp. 416-421. IEEE, Los Alamitos (1989)
    • (1989) FOCS , pp. 416-421
    • Kushilevitz, E.1
  • 15
    • 79953197899 scopus 로고    scopus 로고
    • Exploring the limits of common coins using frontier analysis of protocols
    • Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
    • Maji, H.K., Ouppaphan, P., Prabhakaran, M., Rosulek, M.: Exploring the limits of common coins using frontier analysis of protocols. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 486-503. Springer, Heidelberg (2011), http://eprint.iacr.org/
    • (2011) LNCS , vol.6597 , pp. 486-503
    • Maji, H.K.1    Ouppaphan, P.2    Prabhakaran, M.3    Rosulek, M.4
  • 16
    • 70350679063 scopus 로고    scopus 로고
    • Complexity of multi-party computation problems: The case of 2-party symmetric secure function evaluation
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Maji, H.K., Prabhakaran, M., Rosulek, M.: Complexity of multi-party computation problems: The case of 2-party symmetric secure function evaluation. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 256-273. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 256-273
    • Maji, H.K.1    Prabhakaran, M.2    Rosulek, M.3
  • 17
    • 77956988543 scopus 로고    scopus 로고
    • Cryptographic complexity classes and computational intractability assumptions
    • Yao, A.C.-C. (ed.) Tsinghua University Press, Beijing
    • Maji, H.K., Prabhakaran, M., Rosulek, M.: Cryptographic complexity classes and computational intractability assumptions. In: Yao, A.C.-C. (ed.) ICS, pp. 266-289. Tsinghua University Press, Beijing (2010)
    • (2010) ICS , pp. 266-289
    • Maji, H.K.1    Prabhakaran, M.2    Rosulek, M.3
  • 18
    • 77956989091 scopus 로고    scopus 로고
    • A zero-one law for cryptographic complexity with respect to computational UC security
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Maji, H.K., Prabhakaran, M., Rosulek, M.: A zero-one law for cryptographic complexity with respect to computational UC security. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 595-612. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 595-612
    • Maji, H.K.1    Prabhakaran, M.2    Rosulek, M.3
  • 19
    • 70350649064 scopus 로고    scopus 로고
    • An optimally fair coin toss
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Moran, T., Naor, M., Segev, G.: An optimally fair coin toss. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 1-18. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 1-18
    • Moran, T.1    Naor, M.2    Segev, G.3
  • 20
    • 51849126899 scopus 로고    scopus 로고
    • Cryptographic complexity of multi-party computation problems: Classifications and separations
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Prabhakaran, M., Rosulek, M.: Cryptographic complexity of multi-party computation problems: Classifications and separations. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 262-279. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 262-279
    • Prabhakaran, M.1    Rosulek, M.2
  • 21
    • 0020312165 scopus 로고
    • Protocols for secure computation
    • IEEE, Los Alamitos
    • Yao, A.C.: Protocols for secure computation. In: Proc. 23rd FOCS, pp. 160-164. IEEE, Los Alamitos (1982)
    • (1982) Proc. 23rd FOCS , pp. 160-164
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.