메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Secure combinatorial optimization simulating DFS tree-based variable elimination

Author keywords

[No Author keywords available]

Indexed keywords

ARITHMETIC CIRCUIT; COMBINATORIAL PROBLEM; CONSTRAINT GRAPH; CONSTRAINT OPTIMIZATION PROBLEMS; CONSTRAINT SATISFACTION PROBLEMS; DEPTH-FIRST SEARCH; NP-HARD; OPTIMAL SOLUTIONS; SECURE MULTI-PARTY COMPUTATION; TREE-BASED; VARIABLE ELIMINATION;

EID: 84864569795     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (17)

References (27)
  • 1
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computating
    • M. Ben-Or, S. Goldwasser, and A. Widgerson. Completeness theorems for non-cryptographic fault-tolerant distributed computating. In STOC, pages 1-10, 1988.
    • (1988) STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Widgerson, A.3
  • 2
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • DOI 10.1145/358549.358563
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Com. of ACM, 24(2):84-88, 1981. (Pubitemid 11480996)
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum David, L.1
  • 4
    • 84864572319 scopus 로고    scopus 로고
    • How to split a shared number into bits in constant round and unconditionally secure
    • 2005
    • I. Damgård, M. Fitzi, J. B. Nielsen, and T. Toft. How to split a shared number into bits in constant round and unconditionally secure. Cryptology ePrint Archive, Report 2005/140, 2005. http://eprint.iacr.org.
    • (2005) Cryptology EPrint Archive, Report , vol.140
    • Damgård, I.1    Fitzi, M.2    Nielsen, J.B.3    Toft, T.4
  • 5
    • 0025228149 scopus 로고
    • Enhancement schemes for constraint processing: Backjumping, learning, and cutset decomposition
    • R. Dechter. Enhancement schemes for constraint processing: Backjumping, learning, and cutset decomposition. AI'90, 1990.
    • (1990) AI'90
    • Dechter, R.1
  • 9
    • 84864570691 scopus 로고    scopus 로고
    • Unconditionally secure constant round multi-party computation for equality, comparison, bits and exponentiation
    • E. Kiltz. Unconditionally secure constant round multi-party computation for equality, comparison, bits and exponentiation. Cryptology ePrint Archive, Report 2005/066, 2005. http://eprint.iacr.org.
    • (2005) Cryptology EPrint Archive, Report2005/066
    • Kiltz, E.1
  • 10
  • 11
    • 4544311969 scopus 로고    scopus 로고
    • An asynchronous complete method for distributed constraint optimization
    • P.J. Modi, M. Tambe, W.-M. Shen, and M. Yokoo. An asynchronous complete method for distributed constraint optimization. In AAMAS, Melbourne, 2003.
    • (2003) AAMAS, Melbourne
    • Modi, P.J.1    Tambe, M.2    Shen, W.-M.3    Yokoo, M.4
  • 13
    • 84880707137 scopus 로고    scopus 로고
    • A scalable method for multiagent constraint optimization
    • Adrian Petcu and Boi Faltings. A scalable method for multiagent constraint optimization. In IJCAI, 2005.
    • (2005) IJCAI
    • Petcu, A.1    Faltings, B.2
  • 15
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Comm. of the ACM, 22:612-613, 1979.
    • (1979) Comm. of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 16
    • 84883431983 scopus 로고    scopus 로고
    • Using secure discsp solvers for generalized vickrey auctions, complete and stochastic secure techniques
    • M. Silaghi. Using secure discsp solvers for generalized vickrey auctions, complete and stochastic secure techniques. In IJCAI05 DCR Workshop, 2005.
    • (2005) IJCAI05 DCR Workshop
    • Silaghi, M.1
  • 17
    • 15544376515 scopus 로고    scopus 로고
    • Solving a distributed CSP with cryptographic multi-party computations, without revealing constraints and without involving trusted servers
    • M.-C. Silaghi. Solving a distributed CSP with cryptographic multi-party computations, without revealing constraints and without involving trusted servers. In IJCAI-DCR, 2003.
    • (2003) IJCAI-DCR
    • Silaghi, M.-C.1
  • 18
    • 15544367557 scopus 로고    scopus 로고
    • Meeting scheduling system guaranteeing n/2-privacy and resistant to statistical analysis (applicable to any DisCSP)
    • M.-C. Silaghi. Meeting scheduling system guaranteeing n/2-privacy and resistant to statistical analysis (applicable to any DisCSP). In 3rd IC on Web Intelligence, pages 711-715, 2004.
    • (2004) 3rd IC on Web Intelligence , pp. 711-715
    • Silaghi, M.-C.1
  • 20
    • 84864559556 scopus 로고    scopus 로고
    • Hiding absence of solution for a discsp
    • M.-C. Silaghi. Hiding absence of solution for a discsp. In FLAIRS'05, 2005.
    • (2005) FLAIRS'05
    • Silaghi, M.-C.1
  • 21
    • 84864571594 scopus 로고    scopus 로고
    • Zero-knowledge proofs for mixnets of secret shares and a version of ElGamal with modular homomorphism
    • M.-C. Silaghi. Zero-knowledge proofs for mixnets of secret shares and a version of ElGamal with modular homomorphism. Cryptology ePrint Archive, Report 2005/079, 2005. http://eprint.iacr.org.
    • (2005) Cryptology EPrint Archive, Report 2005/079
    • Silaghi, M.-C.1
  • 22
    • 15544363599 scopus 로고    scopus 로고
    • A comparison of DisCSP algorithms with respect to privacy
    • M.-C. Silaghi and B. Faltings. A comparison of DisCSP algorithms with respect to privacy. In AAMAS-DCR, 2002.
    • (2002) AAMAS-DCR
    • Silaghi, M.-C.1    Faltings, B.2
  • 25
    • 4544252889 scopus 로고    scopus 로고
    • The effect of policies for selecting the solution of a DisCSP on privacy loss
    • M.-C. Silaghi and V. Rajeshirke. The effect of policies for selecting the solution of a DisCSP on privacy loss. In AAMAS, pages 1396-1397, 2004.
    • (2004) AAMAS , pp. 1396-1397
    • Silaghi, M.-C.1    Rajeshirke, V.2
  • 26
    • 84935113569 scopus 로고
    • Error bounds for convolutional codes and an asymtotically opti mum decoding algorithm
    • A.J. Viterbi. Error bounds for convolutional codes and an asymtotically opti mum decoding algorithm. IEEE Trans. on Information Theory, 13(2):260-267, 1967.
    • (1967) IEEE Trans. on Information Theory , vol.13 , Issue.2 , pp. 260-267
    • Viterbi, A.J.1
  • 27
    • 84864573763 scopus 로고    scopus 로고
    • Generalized Vickrey Auctions without Third-Party Servers
    • M. Yokoo and K. Suzuki. Generalized Vickrey Auctions without Third-Party Servers. In FC04, 2004.
    • (2004) FC04
    • Yokoo, M.1    Suzuki, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.