메뉴 건너뛰기




Volumn 6056 LNCS, Issue , 2010, Pages 312-331

Efficient set operations in the presence of malicious adversaries

Author keywords

Oblivious pseudorandom function evaluation; Secure two party computation; Set intersection; Set union; Simulation based security

Indexed keywords

OBLIVIOUS PSEUDORANDOM FUNCTIONS; SECURE TWO-PARTY COMPUTATIONS; SET INTERSECTION; SET UNION; SIMULATION BASED SECURITY;

EID: 79955547393     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13013-7_19     Document Type: Conference Paper
Times cited : (87)

References (37)
  • 1
    • 35048875418 scopus 로고    scopus 로고
    • Secure computation of the kth-Ranked element
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Aggarwal, G., Mishra, N., Pinkas, B.: Secure Computation of the kth-Ranked Element. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 40-55. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 40-55
    • Aggarwal, G.1    Mishra, N.2    Pinkas, B.3
  • 2
    • 38049082907 scopus 로고    scopus 로고
    • Security against covert adversaries: Efficient protocols for realistic adversaries
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Aumann, Y., Lindell, Y.: Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137-156. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 137-156
    • Aumann, Y.1    Lindell, Y.2
  • 4
    • 84898960610 scopus 로고
    • Completeness theorems for non cryptographic fault tolerant distributed computations
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non cryptographic fault tolerant distributed computations. In: 20th STOC, pp. 1-10 (1988)
    • (1988) 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 5
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF formulas on ciphertexts
    • Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
    • Boneh, D., Goh, E., Nissim, K.: Evaluating 2-DNF Formulas on Ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005) (Pubitemid 41231172)
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 6
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols
    • Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols. In: 20th STOC, pp. 11-19 (1988)
    • (1988) 20th STOC , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgård, I.3
  • 7
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
    • Chaum, D., Pedersen, T.P.: Wallet Databases with Observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89-105. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 8
    • 84948970500 scopus 로고    scopus 로고
    • Efficient concurrent zero-knowledge in the auxiliary string model
    • Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
    • Damgård, I.: Efficient Concurrent Zero-Knowledge in the Auxiliary String Model. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 418-430. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 418-430
    • Damgård, I.1
  • 9
    • 84867553981 scopus 로고    scopus 로고
    • A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
    • Public Key Cryptography
    • Damgård, I., Jurik, M.: A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119-136. Springer, Heidelberg (2001) (Pubitemid 33232937)
    • (2001) Lecture Notes in Computer Science , Issue.1992 , pp. 119-136
    • Damgard, I.1    Jurik, M.2
  • 10
    • 84937437506 scopus 로고    scopus 로고
    • Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor
    • Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
    • Damgård, I., Nielsen, J.B.: Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 3-42. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 3-42
    • Damgård, I.1    Nielsen, J.B.2
  • 11
    • 68949136946 scopus 로고    scopus 로고
    • Efficient robust private set intersection
    • Ghilardi, S. (ed.) ANCS 2009. Springer, Heidelberg
    • Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Efficient Robust Private Set Intersection. In: Ghilardi, S. (ed.) ANCS 2009. LNCS, vol. 5479, pp. 125-142. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 125-142
    • Dachman-Soled, D.1    Malkin, T.2    Raykova, M.3    Yung, M.4
  • 12
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
    • El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10-18. Springer, Heidelberg (1984)
    • (1984) LNCS , vol.196 , pp. 10-18
    • El Gamal, T.1
  • 14
    • 33745129227 scopus 로고    scopus 로고
    • Threshold cryptosystems secure against chosenciphertext attacks
    • Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
    • Fouque, P., Pointcheval, D.: Threshold cryptosystems secure against chosenciphertext attacks. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 573-584. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 573-584
    • Fouque, P.1    Pointcheval, D.2
  • 15
    • 84944328129 scopus 로고    scopus 로고
    • Sharing decryption in the context of voting of lotteries
    • Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg
    • Fouque, P., Poupard, G., Stern, J.: Sharing decryption in the context of voting of lotteries. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 90-104. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5628 , pp. 90-104
    • Fouque, P.1    Poupard, G.2    Stern, J.3
  • 16
    • 24144488603 scopus 로고    scopus 로고
    • Keyword search and oblivious pseudorandom functions
    • Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
    • Freedman, M.J., Ishai, Y., Pinkas, B., Reingold, O.: Keyword Search and Oblivious Pseudorandom Functions. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 303-324. Springer, Heidelberg (2005) (Pubitemid 41231171)
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 303-324
    • Freedman, M.J.1    Ishai, Y.2    Pinkas, B.3    Reingold, O.4
  • 17
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set-intersection
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Freedman, M., Nissim, K., Pinkas, B.: Efficient Private Matching and Set-Intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 1-19
    • Freedman, M.1    Nissim, K.2    Pinkas, B.3
  • 19
    • 0000108216 scopus 로고    scopus 로고
    • How to construct constant-round zero-knowledge proof systems for NP
    • Goldreich, O., Kahan, A.: How To Construct Constant-Round Zero-Knowledge Proof Systems for NP. Journal of Cryptology 9(3), 167-190 (1996)
    • (1996) Journal of Cryptology , vol.9 , Issue.3 , pp. 167-190
    • Goldreich, O.1    Kahan, A.2
  • 21
    • 40249108370 scopus 로고    scopus 로고
    • Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
    • Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
    • Hazay, C., Lindell, Y.: Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4948 , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 22
    • 79955546157 scopus 로고    scopus 로고
    • Efficient set operations in the presence of malicious adversaries
    • Hazay, C., Nissim, K.: Efficient Set Operations in the Presence of Malicious Adversaries. Cryptology ePrint Archive, Report 2009/594 (2009), http://eprint.iacr.org/
    • (2009) Cryptology EPrint Archive, Report 2009/594
    • Hazay, C.1    Nissim, K.2
  • 23
    • 70350656283 scopus 로고    scopus 로고
    • Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Jarecki, S., Liu, X.: Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 577-594. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 577-594
    • Jarecki, S.1    Liu, X.2
  • 24
    • 38049077335 scopus 로고    scopus 로고
    • Secure linear algebra using linearly recurrent sequences
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Kiltz, E., Mohassel, P., Weinreb, E., Franklin, M.K.: Secure Linear Algebra Using Linearly Recurrent Sequences. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 291-310. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 291-310
    • Kiltz, E.1    Mohassel, P.2    Weinreb, E.3    Franklin, M.K.4
  • 26
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • DOI 10.1007/s00145-001-0019-2
    • Lindell, Y., Pinkas, B.: Privacy Preserving Data Mining. Journal of Cryptology 15(3), 177-206 (2002) (Pubitemid 44126466)
    • (2002) Journal of Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 27
    • 52049092094 scopus 로고    scopus 로고
    • Efficient secure linear algebra in the presence of covert or computationally unbounded adversaries
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Mohassel, P.,Weinreb, E.: Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 481-496. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 481-496
    • Mohassel, P.1    Weinreb, E.2
  • 29
    • 40249087763 scopus 로고    scopus 로고
    • Number-theoretic constructions of ecient pseudo-random functions
    • Naor, M., Reingold, O.: Number-Theoretic Constructions of Ecient Pseudo-Random Functions. In: 38th FOCS, pp. 231-262 (1997)
    • (1997) 38th FOCS , pp. 231-262
    • Naor, M.1    Reingold, O.2
  • 31
    • 84875762817 scopus 로고
    • Provably secure and practical identification schemes and corresponding signature schemes
    • Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
    • Okamoto, T.: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31-53. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 31-53
    • Okamoto, T.1
  • 32
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 33
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretical secure verifiable secret sharing
    • Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
    • Pedersen, T.P.: Non-Interactive and Information-Theoretical Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129-140. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 34
    • 51849126892 scopus 로고    scopus 로고
    • A framework for efficient and composable oblivious transfer
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Peikert, C., Vaikuntanathan, V., Waters, B.: A Framework for Efficient and Composable Oblivious Transfer. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 554-571. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 554-571
    • Peikert, C.1    Vaikuntanathan, V.2    Waters, B.3
  • 35
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
    • Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239-252. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 239-252
    • Schnorr, C.P.1
  • 36
    • 33244463908 scopus 로고    scopus 로고
    • How asymmetry helps load balancing
    • DOI 10.1145/792538.792546
    • Vocking, B.: How Asymmetry Helps Load Balancing. Journal of the ACM 50(4), 568-589 (2003) (Pubitemid 43906338)
    • (2003) Journal of the ACM , vol.50 , Issue.4 , pp. 568-589
    • Vocking, B.1
  • 37
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • Yao, A.C.: Protocols for secure computations. In: 23rd FOCS, pp. 160-164 (1982)
    • (1982) 23rd FOCS , pp. 160-164
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.