메뉴 건너뛰기




Volumn 6715 LNCS, Issue , 2011, Pages 130-146

Secure efficient multiparty computing of multivariate polynomials and applications

Author keywords

additive homomorphic encryption; multiparty set intersection; multivariate polynomial evaluation; secret sharing; secure multiparty computation; threshold cryptosystems

Indexed keywords

HOMOMORPHIC-ENCRYPTIONS; MULTIVARIATE POLYNOMIAL; SECRET SHARING; SECURE MULTI-PARTY COMPUTATION; SET INTERSECTION; THRESHOLD CRYPTOSYSTEMS;

EID: 79959306358     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-21554-4_8     Document Type: Conference Paper
Times cited : (17)

References (35)
  • 2
    • 84957610863 scopus 로고    scopus 로고
    • Proving in zero-knowledge that a number is the product of two safe primes
    • Stern, J. (ed.) Springer, Heidelberg
    • Camenisch, J., Michels, M.: Proving in zero-knowledge that a number is the product of two safe primes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 107-122. Springer, Heidelberg (1999).
    • (1999) EUROCRYPT 1999. LNCS , vol.1592 , pp. 107-122
    • Camenisch, J.1    Michels, M.2
  • 3
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13 (2000).
    • (2000) Journal of Cryptology , vol.13
    • Canetti, R.1
  • 6
    • 40249113229 scopus 로고    scopus 로고
    • Black-box construction of a non-malleable encryption scheme from any semantically secure one
    • Canetti, R. (ed.) Springer, Heidelberg
    • Choi, S., Dachman-Soled, D., Malkin, T., Wee, H.: Black-box construction of a non-malleable encryption scheme from any semantically secure one. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 427-444. Springer, Heidelberg (2008).
    • (2008) TCC 2008. LNCS , vol.4948 , pp. 427-444
    • Choi, S.1    Dachman-Soled, D.2    Malkin, T.3    Wee, H.4
  • 7
    • 78650834525 scopus 로고    scopus 로고
    • Linear-complexity private set intersection protocols secure in malicious model
    • Abe, M. (ed.) Springer, Heidelberg
    • De Cristofaro, E., Kim, J., Tsudik, G.: Linear-complexity private set intersection protocols secure in malicious model. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 213-231. Springer, Heidelberg (2010).
    • (2010) ASIACRYPT 2010. LNCS , vol.6477 , pp. 213-231
    • De Cristofaro, E.1    Kim, J.2    Tsudik, G.3
  • 8
    • 68949136946 scopus 로고    scopus 로고
    • Efficient robust private set intersection
    • Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) Springer, Heidelberg
    • Dachman-Soled, D., Malkin, T., Raykova,M., Yung,M.: Efficient robust private set intersection. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 125-142. Springer, Heidelberg (2009).
    • (2009) ACNS 2009. LNCS , vol.5536 , pp. 125-142
    • Dachman-Soled, D.1    Raykovam, M.T.2    Yung, M.3
  • 10
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Springer-Verlag New York, Inc., New York
    • ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: CRYPTO 1984, pp. 10-18. Springer-Verlag New York, Inc., New York (1985).
    • (1985) CRYPTO 1984 , pp. 10-18
    • Elgamal, T.1
  • 12
    • 84944328129 scopus 로고    scopus 로고
    • Sharing Decryption in the Context of Voting or Lotteries
    • Financial Cryptography
    • Fouque, P.A., Poupard, G., Stern, J.: Sharing decryption in the context of voting or lotteries. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 90-104. Springer, Heidelberg (2001). (Pubitemid 33359599)
    • (2001) Lecture Notes in Computer Science , Issue.1962 , pp. 90-104
    • Fouque, P.-A.1    Poupard, G.2    Stern, J.3
  • 13
    • 79956318201 scopus 로고    scopus 로고
    • Efficient and secure evaluation of multivariate polynomials and applications
    • Zhou, J., Yung, M. (eds.) Springer, Heidelberg
    • Franklin, M., Mohassel, P.: Efficient and secure evaluation of multivariate polynomials and applications. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 236-254. Springer, Heidelberg (2010).
    • (2010) ACNS 2010. LNCS , vol.6123 , pp. 236-254
    • Franklin, M.1    Mohassel, P.2
  • 15
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Cachin, C., Camenisch, J.L. (eds.) Springer, Heidelberg
    • Freedman, M., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004).
    • (2004) EUROCRYPT 2004. LNCS , vol.3027 , pp. 1-19
    • Freedman, M.1    Nissim, K.2    Pinkas, B.3
  • 16
    • 84976655650 scopus 로고
    • Cryptographic computation: Secure fault tolerant protocols and the public-key model
    • Pomerance, C. (ed.) Springer, Heidelberg
    • Galil, Z., Haber, S., Yung, M.: Cryptographic computation: Secure fault tolerant protocols and the public-key model. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 135-155. Springer, Heidelberg (1988).
    • (1988) CRYPTO 1987. LNCS , vol.293 , pp. 135-155
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 17
    • 33846862213 scopus 로고    scopus 로고
    • Secure distributed key generation for discrete-log based cryptosystems
    • DOI 10.1007/s00145-006-0347-3
    • Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. J. Cryptol. 20(1), 51-83 (2007). (Pubitemid 46224826)
    • (2007) Journal of Cryptology , vol.20 , Issue.1 , pp. 51-83
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 20
    • 33646562165 scopus 로고    scopus 로고
    • Foundations of cryptography: A primer
    • Goldreich, O.: Foundations of cryptography: a primer. Found. Trends Theor. Comput. Sci. 1(1), 1-116 (2005).
    • (2005) Found. Trends Theor. Comput. Sci. , vol.1 , Issue.1 , pp. 1-116
    • Goldreich, O.1
  • 22
    • 40249108370 scopus 로고    scopus 로고
    • Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
    • Canetti, R. (ed.) Springer, Heidelberg
    • Hazay, C., Lindell, Y.: Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti, R. (ed.) TCC. 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008).
    • (2008) TCC. 2008. LNCS , vol.4948 , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 23
    • 51849102397 scopus 로고    scopus 로고
    • Founding cryptography on oblivious transfer-efficiently
    • Wagner, D. (ed.) Springer, Heidelberg
    • Ishai, Y., Prabhakaran, M., Sahai, A.: Founding cryptography on oblivious transfer - efficiently. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 572-591. Springer, Heidelberg (2008).
    • (2008) CRYPTO 2008. LNCS , vol.5157 , pp. 572-591
    • Ishai, Y.1    Prabhakaran, M.2    Sahai, A.3
  • 24
    • 70350677017 scopus 로고    scopus 로고
    • Secure arithmetic computation with no honest majority
    • Reingold, O. (ed.) Springer, Heidelberg
    • Ishai, Y., Prabhakaran, M., Sahai, A.: Secure arithmetic computation with no honest majority. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 294-314. Springer, Heidelberg (2009).
    • (2009) TCC 2009. LNCS , vol.5444 , pp. 294-314
    • Ishai, Y.1    Prabhakaran, M.2    Sahai, A.3
  • 25
    • 70350656283 scopus 로고    scopus 로고
    • Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection
    • Reingold, O. (ed.) Springer, Heidelberg
    • Jarecki, S., Liu, X.: Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 577-594. Springer, Heidelberg (2009).
    • (2009) TCC 2009. LNCS , vol.5444 , pp. 577-594
    • Jarecki, S.1    Liu, X.2
  • 27
    • 33750199090 scopus 로고    scopus 로고
    • Oblivious polynomial evaluation
    • DOI 10.1137/S0097539704383633
    • Naor, M., Pinkas, B.: Oblivious polynomial evaluation. SIAM J. Comput. 35(5), 1254-1281 (2006). (Pubitemid 44599926)
    • (2006) SIAM Journal on Computing , vol.35 , Issue.5 , pp. 1254-1281
    • Naor, M.1    Pinkas, B.2
  • 28
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Stern, J. (ed.) Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999).
    • (1999) EUROCRYPT 1999. LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 29
    • 70549091142 scopus 로고    scopus 로고
    • Information theoretically secure multi party set intersection re-visited
    • Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) Springer, Heidelberg
    • Patra, A., Choudhary, A., Rangan, C.: Information theoretically secure multi party set intersection re-visited. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 71-91. Springer, Heidelberg (2009).
    • (2009) SAC 2009. LNCS , vol.5867 , pp. 71-91
    • Patra, A.1    Choudhary, A.2    Rangan, C.3
  • 30
    • 77649259693 scopus 로고    scopus 로고
    • Round efficient unconditionally secure mpc and multiparty set intersection with optimal resilience
    • Roy, B., Sendrier, N. (eds.) Springer, Heidelberg
    • Patra, A., Choudhary, A., Rangan, C.P.: Round efficient unconditionally secure mpc and multiparty set intersection with optimal resilience. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 398-417. Springer, Heidelberg (2009).
    • (2009) INDOCRYPT 2009. LNCS , vol.5922 , pp. 398-417
    • Patra, A.1    Choudhary, A.2    Rangan, C.P.3
  • 33
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A.: How to share a secret. Commun. ACM 22(11), 612-613 (1979).
    • (1979) Commun ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 34
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • Yao, A.C.C.: Protocols for secure computations. In: FOCS, pp. 160-164 (1982).
    • (1982) FOCS , pp. 160-164
    • Yao, A.C.C.1
  • 35
    • 0022882770 scopus 로고
    • How to generate and exchange secrets (extended abstract)
    • Yao, A.C.C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162-167 (1986)
    • (1986) FOCS , pp. 162-167
    • Yao, A.C.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.