메뉴 건너뛰기




Volumn 7417 LNCS, Issue , 2012, Pages 124-143

Collusion-preserving computation

Author keywords

[No Author keywords available]

Indexed keywords

ARBITRARY COMMUNICATION; COMMUNICATION MODELS; GAME-THEORETIC; NETWORK TOPOLOGY; PHYSICAL ASSUMPTIONS; SUPPORT COMPOSITION;

EID: 84865489601     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32009-5_9     Document Type: Conference Paper
Times cited : (21)

References (30)
  • 1
    • 33748686155 scopus 로고    scopus 로고
    • Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation
    • ACM Press
    • Abraham, I., Dolev, D., Gonen, R., Halpern, J.: Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In: 25th ACM PODC, pp. 53-62. ACM Press (2006)
    • (2006) 25th ACM PODC , pp. 53-62
    • Abraham, I.1    Dolev, D.2    Gonen, R.3    Halpern, J.4
  • 2
    • 40249092942 scopus 로고    scopus 로고
    • Lower Bounds on Implementing Robust and Resilient Mediators
    • Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
    • Abraham, I., Dolev, D., Halpern, J.Y.: Lower Bounds on Implementing Robust and Resilient Mediators. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 302-319. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4948 , pp. 302-319
    • Abraham, I.1    Dolev, D.2    Halpern, J.Y.3
  • 3
    • 70350304833 scopus 로고    scopus 로고
    • Collusion-Free Multiparty Computation in the Mediated Model
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Alwen, J., Katz, J., Lindell, Y., Persiano, G., Shelat, A., Visconti, I.: Collusion-Free Multiparty Computation in the Mediated Model. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 524-540. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 524-540
    • Alwen, J.1    Katz, J.2    Lindell, Y.3    Persiano, G.4    Shelat, A.5    Visconti, I.6
  • 4
    • 84865506830 scopus 로고    scopus 로고
    • Collusion preserving computation
    • ePrint Archive, Report 2011/443
    • Alwen, J., Katz, J., Maurer, U., Zikas, V.: Collusion preserving computation. Cryptology ePrint Archive, Report 2011/443 (2011), http://eprint.iacr.org/2011/433
    • (2011) Cryptology
    • Alwen, J.1    Katz, J.2    Maurer, U.3    Zikas, V.4
  • 5
    • 51849140874 scopus 로고    scopus 로고
    • Collusion-Free Protocols in the Mediated Model
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Alwen, J., Shelat, A., Visconti, I.: Collusion-Free Protocols in the Mediated Model. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 497-514. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 497-514
    • Alwen, J.1    Shelat, A.2    Visconti, I.3
  • 6
    • 0002430114 scopus 로고
    • Subjectivity and Correlation in Randomized Strategies
    • Aumann, R.: Subjectivity and Correlation in Randomized Strategies. Journal of Math. Econ. 1, 67-96 (1974)
    • (1974) Journal of Math. Econ. , vol.1 , pp. 67-96
    • Aumann, R.1
  • 8
    • 0001415601 scopus 로고
    • Fair distribution protocols, or how the players replace fortune
    • Barany, I.: Fair distribution protocols, or how the players replace fortune. Mathematics of Operations Research 17, 327-340 (1992)
    • (1992) Mathematics of Operations Research , vol.17 , pp. 327-340
    • Barany, I.1
  • 9
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • IEEE Full version at
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd FOCS, pp. 136-145. IEEE (2001), Full version at http://eprint.iacr.org/2000/067/
    • (2001) 42nd FOCS , pp. 136-145
    • Canetti, R.1
  • 10
    • 38049064364 scopus 로고    scopus 로고
    • Universally Composable Security with Global Setup
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Canetti, R., Dodis, Y., Pass, R., Walfish, S.: Universally Composable Security with Global Setup. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 61-85. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 61-85
    • Canetti, R.1    Dodis, Y.2    Pass, R.3    Walfish, S.4
  • 11
    • 0036038991 scopus 로고    scopus 로고
    • Universally composable two-party and multi-party secure computation
    • Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally composable two-party and multi-party secure computation. In: STOC, pp. 494-503 (2002)
    • (2002) STOC , pp. 494-503
    • Canetti, R.1    Lindell, Y.2    Ostrovsky, R.3    Sahai, A.4
  • 12
    • 84865474249 scopus 로고    scopus 로고
    • Universally composable security with local adversaries
    • ePrint Archive, Report 2012/117
    • Canetti, R., Vald,M.: Universally composable security with local adversaries. Cryptology ePrint Archive, Report 2012/117 (2012), http://eprint.iacr.org/2012/117
    • (2012) Cryptology
    • Canetti, R.1    Vald, M.2
  • 13
    • 0000510636 scopus 로고
    • Strategic information transmission
    • Crawford, V., Sobel, J.: Strategic information transmission. Econometrica 50, 1431-1451 (1982)
    • (1982) Econometrica , vol.50 , pp. 1431-1451
    • Crawford, V.1    Sobel, J.2
  • 14
    • 70350639645 scopus 로고    scopus 로고
    • Composability and On-Line Deniability of Authentication
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Dodis, Y., Katz, J., Smith, A., Walfish, S.: Composability and On-Line Deniability of Authentication. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 146-162. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 146-162
    • Dodis, Y.1    Katz, J.2    Smith, A.3    Walfish, S.4
  • 15
    • 0000552236 scopus 로고
    • Universal mechanisms
    • Forges, F.: Universal mechanisms. Econometrica 58, 1342-1364 (1990)
    • (1990) Econometrica , vol.58 , pp. 1342-1364
    • Forges, F.1
  • 16
    • 33645593031 scopus 로고    scopus 로고
    • Foundations of Cryptography
    • Cambridge University Press, Cambridge
    • Goldreich, O.: Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press, Cambridge (2004)
    • (2004) Basic Applications , vol.2
    • Goldreich, O.1
  • 17
    • 0023545076 scopus 로고
    • How to play any mental game, or a completeness theorem for protocols with honest majority
    • ACM Press
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game, or a completeness theorem for protocols with honest majority. In: 19th ACM STOC, pp. 218-229. ACM Press (1987)
    • (1987) 19th ACM STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 19
    • 40249119683 scopus 로고    scopus 로고
    • Verifiably Secure Devices
    • Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
    • Izmalkov, S., Lepinski, M., Micali, S.: Verifiably Secure Devices. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 273-301. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4948 , pp. 273-301
    • Izmalkov, S.1    Lepinski, M.2    Micali, S.3
  • 21
    • 33748582624 scopus 로고    scopus 로고
    • Rational secure computation and ideal mechanism design
    • IEEE Full version available at
    • Izmalkov, S., Micali, S., Lepinski, M.: Rational secure computation and ideal mechanism design. In: 46th FOCS, pp. 585-595. IEEE (2005), Full version available at http://dspace.mit.edu/handle/1721.1/38208
    • (2005) 46th FOCS , pp. 585-595
    • Izmalkov, S.1    Micali, S.2    Lepinski, M.3
  • 23
    • 10444265884 scopus 로고    scopus 로고
    • Completely fair SFE and coalitionsafe cheap talk
    • ACM Press
    • Lepinski, M., Micali, S., Peikert, C., Shelat, A.: Completely fair SFE and coalitionsafe cheap talk. In: 23rd ACM PODC, pp. 1-10. ACM Press (2004)
    • (2004) 23rd ACM PODC , pp. 1-10
    • Lepinski, M.1    Micali, S.2    Peikert, C.3    Shelat, A.4
  • 24
    • 33748680791 scopus 로고    scopus 로고
    • Collusion-free protocols
    • ACM Press
    • Lepinski, M., Micali, S., Shelat, A.: Collusion-free protocols. In: 37th ACM STOC, pp. 543-552. ACM Press (2005)
    • (2005) 37th ACM STOC , pp. 543-552
    • Lepinski, M.1    Micali, S.2    Shelat, A.3
  • 25
    • 24144447639 scopus 로고    scopus 로고
    • Fair-Zero Knowledge
    • Kilian, J. (ed.) TCC 2005. Springer, Heidelberg
    • Lepinski, M., Micali, S., Shelat, A.: Fair-Zero Knowledge. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 245-263. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3378 , pp. 245-263
    • Lepinski, M.1    Micali, S.2    Shelat, A.3
  • 28
    • 0001217738 scopus 로고
    • The prisoners' problem and the subliminal channel
    • Plenum Press
    • Simmons, G.J.: The prisoners' problem and the subliminal channel. In: Crypto 1983, pp. 51-67. Plenum Press (1984)
    • (1984) Crypto 1983 , pp. 51-67
    • Simmons, G.J.1
  • 29
    • 0028532997 scopus 로고
    • Cryptanalysis and protocol failures
    • Simmons, G.J.: Cryptanalysis and protocol failures. Communications of the ACM 37(11), 56-65 (1994)
    • (1994) Communications of the ACM , vol.37 , Issue.11 , pp. 56-65
    • Simmons, G.J.1
  • 30
    • 84955557536 scopus 로고    scopus 로고
    • The History of Subliminal Channels
    • Anderson, R. (ed.) IH 1996. Springer, Heidelberg
    • Simmons, G.J.: The History of Subliminal Channels. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 237-256. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1174 , pp. 237-256
    • Simmons, G.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.