메뉴 건너뛰기




Volumn , Issue , 2011, Pages 291-292

Secure data structures based on multi-party computation

Author keywords

reactive functionalities; secure multi party computation

Indexed keywords

ACCESS PATTERNS; GENERIC SOLUTIONS; MEMORY LOCATIONS; MULTIPARTY COMPUTATION; PRIORITY QUEUES; RANDOM BITS; REACTIVE FUNCTIONALITY; SECURE MULTI-PARTY COMPUTATION;

EID: 79959864414     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1993806.1993859     Document Type: Conference Paper
Times cited : (21)

References (15)
  • 1
    • 77954755618 scopus 로고    scopus 로고
    • Oblivious rams without cryptogrpahic assumptions
    • M. Ajtai. Oblivious rams without cryptogrpahic assumptions. In STOC, 2010.
    • (2010) STOC
    • Ajtai, M.1
  • 2
    • 84898960610 scopus 로고
    • Completeness theorems for noncryptographic fault-tolerant distributed computations
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic fault-tolerant distributed computations. In STOC, 1988.
    • (1988) STOC
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 3
    • 79959899156 scopus 로고    scopus 로고
    • Cache-oblivious data structures and algorithms for undirected breadth-first search and shortest paths
    • G. Brodal, R. Fagerberg, U. Meyer, and N. Zeh. Cache-oblivious data structures and algorithms for undirected breadth-first search and shortest paths. In SWAT, 2004.
    • (2004) SWAT
    • Brodal, G.1    Fagerberg, R.2    Meyer, U.3    Zeh, N.4
  • 4
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols
    • D. Chaum, C. Crépeau, and I. Damgård. Multiparty unconditionally secure protocols. In STOC, 1988.
    • (1988) STOC
    • Chaum, D.1    Crépeau, C.2    Damgård, I.3
  • 5
    • 33746088658 scopus 로고    scopus 로고
    • Multiparty computation from threshold homomorphic encryption
    • R. Cramer, I. Damgård, and J. Nielsen. Multiparty computation from threshold homomorphic encryption. In Eurocrypt, 2001.
    • (2001) Eurocrypt
    • Cramer, R.1    Damgård, I.2    Nielsen, J.3
  • 7
    • 33645595606 scopus 로고    scopus 로고
    • Universally composable efficient multiparty computation from threshold homomorphic encryption
    • I. Damgård and J. Nielsen. Universally composable efficient multiparty computation from threshold homomorphic encryption. In Crypto, 2003.
    • (2003) Crypto
    • Damgård, I.1    Nielsen, J.2
  • 9
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious rams
    • O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious rams. J. ACM, 43(3):431-473, 1996.
    • (1996) J. ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 10
    • 67650152160 scopus 로고    scopus 로고
    • Multiparty computation for interval, equality, and comparison without bit-decomposition protocol
    • T. Nishide and K. Ohta. Multiparty computation for interval, equality, and comparison without bit-decomposition protocol. In PKC, 2007.
    • (2007) PKC
    • Nishide, T.1    Ohta, K.2
  • 11
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Eurocrypt, 1999.
    • (1999) Eurocrypt
    • Paillier, P.1
  • 12
    • 84881231420 scopus 로고    scopus 로고
    • Oblivious RAM revisited
    • B. Pinkas and T. Reinman. Oblivious RAM revisited. In Crypto, 2010.
    • (2010) Crypto
    • Pinkas, B.1    Reinman, T.2
  • 13
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 14
    • 79959864414 scopus 로고    scopus 로고
    • Secure datastructures based on multiparty computation
    • T. Toft. Secure datastructures based on multiparty computation. Cryptology ePrint Archive, Report 2011/081, 2011. http://eprint.iacr.org/.
    • (2011) Cryptology ePrint Archive, Report 2011/081
    • Toft, T.1
  • 15
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • extended abstract
    • A. Yao. Protocols for secure computations (extended abstract). In FOCS, 1982.
    • (1982) FOCS
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.