메뉴 건너뛰기




Volumn 25, Issue 1, 2012, Pages 14-40

Partial fairness in secure two-party computation

Author keywords

Fairness; Secure computation

Indexed keywords

COMMUNICATION MODELS; CRYPTOGRAPHIC ASSUMPTIONS; FAIRNESS; POLYNOMIAL SIZE; SECURE COMPUTATION; SECURE TWO-PARTY COMPUTATIONS; TRAPDOOR PERMUTATIONS; TWO-PARTY COMPUTATION;

EID: 84855447466     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/s00145-010-9079-5     Document Type: Article
Times cited : (28)

References (31)
  • 1
    • 38049082907 scopus 로고    scopus 로고
    • Security against covert adversaries: Efficient protocols for realistic adversaries
    • Springer Berlin. 10.1007/978-3-540-70936-7-8
    • Y. Aumann, Y. Lindell, Security against covert adversaries: efficient protocols for realistic adversaries, in Theory of Cryptography Conference-TCC 2007. LNCS, vol. 4392 (Springer, Berlin, 2007), pp. 137-156
    • (2007) Theory of Cryptography Conference-TCC 2007. LNCS , vol.4392 , pp. 137-156
    • Aumann, Y.1    Lindell, Y.2
  • 2
    • 85029542707 scopus 로고
    • Foundations of secure interactive computing
    • Springer Berlin
    • D. Beaver, Foundations of secure interactive computing, in Advances in Cryptology-Crypto '91. LNCS, vol. 576 (Springer, Berlin, 1992), pp. 377-391
    • (1992) Advances in Cryptology-Crypto '91. LNCS , vol.576 , pp. 377-391
    • Beaver, D.1
  • 4
    • 77956987124 scopus 로고    scopus 로고
    • Protocols for multiparty coin toss with dishonest majority
    • Springer Berlin. 10.1007/978-3-642-14623-7-29
    • A. Beimel, E. Omri, I. Orlov, Protocols for multiparty coin toss with dishonest majority, in Advances in Cryptology-Crypto 2010. LNCS, vol. 6223 (Springer, Berlin, 2010), pp. 538-557
    • (2010) Advances in Cryptology-Crypto 2010. LNCS , vol.6223 , pp. 538-557
    • Beimel, A.1    Omri, E.2    Orlov, I.3
  • 6
    • 84976804419 scopus 로고
    • How to exchange (secret) keys
    • 10.1145/357360.357368
    • M. Blum 1984 How to exchange (secret) keys ACM Trans. Comput. Syst. 1 175 193 10.1145/357360.357368
    • (1984) ACM Trans. Comput. Syst. , vol.1 , pp. 175-193
    • Blum, M.1
  • 7
    • 84974588386 scopus 로고    scopus 로고
    • Timed commitments
    • Springer Berlin. 10.1007/3-540-44598-6-15
    • D. Boneh, M. Naor, Timed commitments, in Advances in Cryptology-Crypto 2000. LNCS, vol. 1880 (Springer, Berlin, 2000), pp. 236-254
    • (2000) Advances in Cryptology-Crypto 2000. LNCS , vol.1880 , pp. 236-254
    • Boneh, D.1    Naor, M.2
  • 8
    • 84969520105 scopus 로고    scopus 로고
    • Optimistic fair secure computation
    • Springer Berlin. 10.1007/3-540-44598-6-6
    • C. Cachin, J. Camenisch, Optimistic fair secure computation, in Advances in Cryptology -Crypto 2000. LNCS, vol. 1880 (Springer, Berlin, 2000), pp. 93-111
    • (2000) Advances in Cryptology -Crypto 2000. LNCS , vol.1880 , pp. 93-111
    • Cachin, C.1    Camenisch, J.2
  • 9
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • 10.1007/s001459910006 0957.68040 1732900
    • R. Canetti 2000 Security and composition of multiparty cryptographic protocols J. Cryptol. 13 1 143 202 10.1007/s001459910006 0957.68040 1732900
    • (2000) J. Cryptol. , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 10
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • R. Canetti, Universally composable security: a new paradigm for cryptographic protocols, in 42nd Annual Symposium on Foundations of Computer Science (FOCS) (IEEE Press, New York, 2001), pp. 136-145 (Pubitemid 33068374)
    • (2001) Annual Symposium on Foundations of Computer Science - Proceedings , pp. 136-145
    • Canetti, R.1
  • 11
    • 0012610677 scopus 로고
    • Limits on the security of coin flips when half the processors are faulty
    • Assoc. Comput. Mach. New York
    • R. Cleve, Limits on the security of coin flips when half the processors are faulty, in 18th Annual ACM Symposium on Theory of Computing (STOC) (Assoc. Comput. Mach., New York, 1986), pp. 364-369
    • (1986) 18th Annual ACM Symposium on Theory of Computing (STOC) , pp. 364-369
    • Cleve, R.1
  • 12
    • 85032862578 scopus 로고
    • Controlled gradual disclosure schemes for random bits and their applications
    • Springer Berlin
    • R. Cleve, Controlled gradual disclosure schemes for random bits and their applications, in Advances in Cryptology-Crypto '89. LNCS, vol. 435 (Springer, Berlin, 1990), pp. 573-588
    • (1990) Advances in Cryptology-Crypto '89. LNCS , vol.435 , pp. 573-588
    • Cleve, R.1
  • 13
    • 0029362450 scopus 로고
    • Practical and provably secure release of a secret and exchange of signatures
    • 10.1007/BF00191356 0840.94014
    • I. Damgård 1995 Practical and provably secure release of a secret and exchange of signatures J. Cryptol. 8 4 201 222 10.1007/BF00191356 0840.94014
    • (1995) J. Cryptol. , vol.8 , Issue.4 , pp. 201-222
    • Damgård, I.1
  • 14
    • 20444446289 scopus 로고    scopus 로고
    • Concurrent zero-knowledge
    • DOI 10.1145/1039488.1039489
    • C. Dwork M. Naor A. Sahai 2004 Concurrent zero-knowledge J. ACM 51 6 851 898 1125.94031 2145257 (Pubitemid 40818309)
    • (2004) Journal of the ACM , vol.51 , Issue.6 , pp. 851-898
    • Dwork, C.1    Naor, M.2    Sahai, A.3
  • 15
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • DOI 10.1145/3812.3818
    • S. Even O. Goldreich A. Lempel 1985 A randomized protocol for signing contracts Commun. ACM 28 6 637 647 10.1145/3812.3818 800680 (Pubitemid 15569164)
    • (1985) Communications of the ACM , vol.28 , Issue.6 , pp. 637-647
    • Even Shimon1    Goldreich Oded2    Lempel Abraham3
  • 17
    • 84976655650 scopus 로고
    • Cryptographic computation: Secure faut-tolerant protocols and the public-key model
    • Springer Berlin
    • Z. Galil, S. Haber, M. Yung, Cryptographic computation: Secure faut-tolerant protocols and the public-key model, in Advances in Cryptology-Crypto '87. LNCS, vol. 293 (Springer, Berlin, 1988), pp. 135-155
    • (1988) Advances in Cryptology-Crypto '87. LNCS , vol.293 , pp. 135-155
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 20
    • 33745184723 scopus 로고    scopus 로고
    • Session-key generation using human passwords only
    • 10.1007/s00145-006-0233-z 1103.68513 2241561
    • O. Goldreich Y. Lindell 2006 Session-key generation using human passwords only J. Cryptol. 19 3 241 340 10.1007/s00145-006-0233-z 1103.68513 2241561
    • (2006) J. Cryptol. , vol.19 , Issue.3 , pp. 241-340
    • Goldreich, O.1    Lindell, Y.2
  • 21
    • 84955564077 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • Springer Berlin
    • S. Goldwasser, L.A. Levin, Fair computation of general functions in presence of immoral majority, in Advances in Cryptology-Crypto '90. LNCS, vol. 537 (Springer, Berlin, 1991), pp. 77-93
    • (1991) Advances in Cryptology-Crypto '90. LNCS , vol.537 , pp. 77-93
    • Goldwasser, S.1    Levin, L.A.2
  • 23
    • 70350630630 scopus 로고    scopus 로고
    • Complete fairness in multi-party computation without an honest majority
    • Springer Berlin
    • S. Gordon, J. Katz, Complete fairness in multi-party computation without an honest majority, in 6th Theory of Cryptography Conference-TCC 2009. LNCS, vol. 5444 (Springer, Berlin, 2009), pp. 19-35
    • (2009) 6th Theory of Cryptography Conference-TCC 2009. LNCS , vol.5444 , pp. 19-35
    • Gordon, S.1    Katz, J.2
  • 25
    • 35448952561 scopus 로고    scopus 로고
    • On achieving the "best of both worlds" in secure multiparty computation
    • DOI 10.1145/1250790.1250793, STOC'07: Proceedings of the 39th Annual ACM Symposium on Theory of Computing
    • J. Katz, On achieving the "best of both worlds" in secure multiparty computation, in 39th Annual ACM Symposium on Theory of Computing (STOC) (Assoc. Comput. Mach., New York, 2007), pp. 11-20 (Pubitemid 47630716)
    • (2007) Proceedings of the Annual ACM Symposium on Theory of Computing , pp. 11-20
    • Katz, J.1
  • 30
    • 35248883427 scopus 로고    scopus 로고
    • Fair Secure Two-Party Computation
    • Advances in Cryptology - EUROCRPYT 2003: International Conference on the Theory and Applications of Cryptographic Techniques Warsaw, Poland, May 4-8, 2003 Proceedings
    • B. Pinkas, Fair secure two-party computation, in Advances in Cryptology-Eurocrypt 2003. LNCS, vol. 2656 (Springer, Berlin, 2003), pp. 87-105 (Pubitemid 36572170)
    • (2003) LNCS , Issue.2656 , pp. 87-105
    • Pinkas, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.