메뉴 건너뛰기




Volumn 7178 LNCS, Issue , 2012, Pages 416-432

Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces

Author keywords

[No Author keywords available]

Indexed keywords

ARITHMETIC CIRCUIT; BOOLEAN CIRCUIT; BOOLEAN REPRESENTATION; SECURE MULTI-PARTY COMPUTATION; SEMI-HONEST ADVERSARIES; SIGNIFICANT IMPACTS;

EID: 84863275770     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-27954-6_26     Document Type: Conference Paper
Times cited : (72)

References (30)
  • 2
    • 84928743703 scopus 로고
    • Precomputing Oblivious Transfer
    • Coppersmith, D. (ed.) CRYPTO 1995. Springer, Heidelberg
    • Beaver, D.: Precomputing Oblivious Transfer. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 97-109. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.963 , pp. 97-109
    • Beaver, D.1
  • 4
    • 57049188348 scopus 로고    scopus 로고
    • Sharemind: A Framework for Fast Privacy-Preserving Computations
    • Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
    • Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A Framework for Fast Privacy-Preserving Computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192-206. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 192-206
    • Bogdanov, D.1    Laur, S.2    Willemson, J.3
  • 7
    • 84863447066 scopus 로고    scopus 로고
    • SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics
    • USENIX Association
    • Burkhart, M., Strasser, M., Many, D., Dimitropoulos, X.: SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics. In: 19th USENIX Security Symposium, pp. 223-240. USENIX Association (2010)
    • (2010) 19th USENIX Security Symposium , pp. 223-240
    • Burkhart, M.1    Strasser, M.2    Many, D.3    Dimitropoulos, X.4
  • 9
    • 84947242606 scopus 로고    scopus 로고
    • Dynamic Replica Placement for Scalable Content Delivery
    • Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. Springer, Heidelberg
    • Chen, Y., Katz, R.H., Katz, Y.H., Kubiatowicz, J.D.: Dynamic Replica Placement for Scalable Content Delivery. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 306-318. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2429 , pp. 306-318
    • Chen, Y.1    Katz, R.H.2    Katz, Y.H.3    Kubiatowicz, J.D.4
  • 10
    • 84863273531 scopus 로고    scopus 로고
    • Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces
    • ePrint Archive, Report 2011/257
    • Choi, S.G., Hwang, K., Katz, J., Malkin, T., Rubenstein, D.: Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. Cryptology ePrint Archive, Report 2011/257 (2011), http://eprint.iacr.org/2011/257
    • (2011) Cryptology
    • Choi, S.G.1    Hwang, K.2    Katz, J.3    Malkin, T.4    Rubenstein, D.5
  • 11
    • 67049134126 scopus 로고    scopus 로고
    • Asynchronous Multiparty Computation: Theory and Implementation
    • Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
    • Damgård, I., Geisler, M., Krøigaard, M., Nielsen, J.B.: Asynchronous Multiparty Computation: Theory and Implementation. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 160-179. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 160-179
    • Damgård, I.1    Geisler, M.2    Krøigaard, M.3    Nielsen, J.B.4
  • 12
    • 33645593031 scopus 로고    scopus 로고
    • Foundations of Cryptography
    • Cambridge University Press, Cambridge
    • Goldreich, O.: Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press, Cambridge (2004)
    • (2004) Basic Applications , vol.2
    • Goldreich, O.1
  • 15
    • 84914127581 scopus 로고    scopus 로고
    • Faster secure two-party computation using garbled circuits
    • USENIX Association
    • Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. In: 20th USENIX Security Symposium. USENIX Association (2011)
    • (2011) 20th USENIX Security Symposium
    • Huang, Y.1    Evans, D.2    Katz, J.3    Malka, L.4
  • 16
    • 24144457853 scopus 로고    scopus 로고
    • Extending Oblivious Transfers Efficiently
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending Oblivious Transfers Efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 145-161
    • Ishai, Y.1    Kilian, J.2    Nissim, K.3    Petrank, E.4
  • 17
    • 77956992754 scopus 로고    scopus 로고
    • Efficient Implementation of the Orlandi Protocol
    • Zhou, J., Yung, M. (eds.) ACNS 2010. Springer, Heidelberg
    • Jakobsen, T.P., Makkes, M.X., Nielsen, J.D.: Efficient Implementation of the Orlandi Protocol. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 255-272. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6123 , pp. 255-272
    • Jakobsen, T.P.1    Makkes, M.X.2    Nielsen, J.D.3
  • 18
    • 0036497474 scopus 로고    scopus 로고
    • Object replication strategies in content distribution networks
    • Kangasharju, J., Roberts, J., Ross, K.W.: Object replication strategies in content distribution networks. Computer Communications 25(4), 376-383 (2002)
    • (2002) Computer Communications , vol.25 , Issue.4 , pp. 376-383
    • Kangasharju, J.1    Roberts, J.2    Ross, K.W.3
  • 19
    • 71549170830 scopus 로고    scopus 로고
    • Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
    • Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
    • Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 1-20. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5888 , pp. 1-20
    • Kolesnikov, V.1    Sadeghi, A.-R.2    Schneider, T.3
  • 20
    • 56449122093 scopus 로고    scopus 로고
    • Evolutionary Market Agents for Resource Allocation in Decentralised Systems
    • Rudolph, G., Jansen, T., Lucas, S., Poloni, C., Beume, N. (eds.) PPSN 2008. Springer, Heidelberg
    • Lewis, P.R., Marrow, P., Yao, X.: Evolutionary Market Agents for Resource Allocation in Decentralised Systems. In: Rudolph, G., Jansen, T., Lucas, S., Poloni, C., Beume, N. (eds.) PPSN 2008. LNCS, vol. 5199, pp. 1071-1080. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5199 , pp. 1071-1080
    • Lewis, P.R.1    Marrow, P.2    Yao, X.3
  • 21
    • 84863259444 scopus 로고    scopus 로고
    • Efficient reduction of 1-out-of-n oblivious transfers in random oracle model
    • ePrint Archive, Report 2005/279
    • Li, B., Li, H., Xu, G., Xu, H.: Efficient reduction of 1-out-of-n oblivious transfers in random oracle model. Cryptology ePrint Archive, Report 2005/279 (2005)
    • (2005) Cryptology
    • Li, B.1    Li, H.2    Xu, G.3    Xu, H.4
  • 22
    • 52149120767 scopus 로고    scopus 로고
    • Implementing Two-Party Computation Efficiently with Security against Malicious Adversaries
    • Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008 Springer, Heidelberg
    • Lindell, Y., Pinkas, B., Smart, N.P.: Implementing Two-Party Computation Efficiently with Security against Malicious Adversaries. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 2-20. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5229 , pp. 2-20
    • Lindell, Y.1    Pinkas, B.2    Smart, N.P.3
  • 24
    • 85084163840 scopus 로고    scopus 로고
    • Fairplay - A secure two-party computation system
    • USENIX Association
    • Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay - a secure two-party computation system. In: 13th USENIX Security Symposium, pp. 287-302. USENIX Association (2004)
    • (2004) 13th USENIX Security Symposium , pp. 287-302
    • Malkhi, D.1    Nisan, N.2    Pinkas, B.3    Sella, Y.4
  • 25
    • 22044454088 scopus 로고    scopus 로고
    • Computationally secure oblivious transfer
    • Naor, M., Pinkas, B.: Computationally secure oblivious transfer. J. Cryptology 18(1), 1-35 (2005)
    • (2005) J. Cryptology , vol.18 , Issue.1 , pp. 1-35
    • Naor, M.1    Pinkas, B.2
  • 26
    • 72449131818 scopus 로고    scopus 로고
    • Secure Two-Party Computation is Practical
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Pinkas, B., Schneider, T., Smart, N.P., Williams, S.C.: Secure Two-Party Computation is Practical. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 250-267. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 250-267
    • Pinkas, B.1    Schneider, T.2    Smart, N.P.3    Williams, S.C.4
  • 28
    • 47249166044 scopus 로고    scopus 로고
    • Market-based grid resource allocation using a stable continuous double auction
    • IEEE
    • Tan, Z., Gurd, J.R.: Market-based grid resource allocation using a stable continuous double auction. In: Proc. 8th IEEE/ACM Intl. Conf. on Grid Computing, pp. 283-290. IEEE (2007)
    • (2007) Proc. 8th IEEE/ACM Intl. Conf. on Grid Computing , pp. 283-290
    • Tan, Z.1    Gurd, J.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.