메뉴 건너뛰기




Volumn 7417 LNCS, Issue , 2012, Pages 681-700

A new approach to practical active-secure two-party computation

Author keywords

[No Author keywords available]

Indexed keywords

ACTIVE ADVERSARY; AES ENCRYPTION; BOOLEAN GATE; GARBLED CIRCUITS; NOVEL TECHNIQUES; RANDOM ORACLE MODEL; TWO-PARTY COMPUTATION;

EID: 84865506559     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32009-5_40     Document Type: Conference Paper
Times cited : (262)

References (32)
  • 1
    • 79958017670 scopus 로고    scopus 로고
    • Two-Output Secure Computation with Malicious Adversaries
    • Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
    • Shelat, A., Shen, C.-H.: Two-Output Secure Computation with Malicious Adversaries. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 386-405. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6632 , pp. 386-405
    • Shelat, A.1    Shen, C.-H.2
  • 2
    • 80051980769 scopus 로고    scopus 로고
    • Semantic security under related-key attacks and applications
    • Applebaum, B., Harnik, D., Ishai, Y.: Semantic security under related-key attacks and applications. In: ICS, pp. 45-60 (2011)
    • (2011) ICS , pp. 45-60
    • Applebaum, B.1    Harnik, D.2    Ishai, Y.3
  • 3
    • 70349266254 scopus 로고    scopus 로고
    • FairplayMP: A system for secure multi-party computation
    • Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: a system for secure multi-party computation. In: CCS, pp. 257-266 (2008)
    • (2008) CCS , pp. 257-266
    • Ben-David, A.1    Nisan, N.2    Pinkas, B.3
  • 4
    • 79958004492 scopus 로고    scopus 로고
    • Semi-homomorphic Encryption and Multiparty Computation
    • Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
    • Bendlin, R., Damgård, I., Orlandi, C., Zakarias, S.: Semi-homomorphic Encryption and Multiparty Computation. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 169-188. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6632 , pp. 169-188
    • Bendlin, R.1    Damgård, I.2    Orlandi, C.3    Zakarias, S.4
  • 5
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136-145 (2001)
    • (2001) FOCS , pp. 136-145
    • Canetti, R.1
  • 6
    • 84863275770 scopus 로고    scopus 로고
    • Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces
    • Dunkelman, O. (ed.) CT-RSA 2012. Springer, Heidelberg
    • Choi, S.G., Hwang, K.-W., Katz, J., Malkin, T., Rubenstein, D.: Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 416-432. Springer, Heidelberg (2012)
    • LNCS , vol.7178 , Issue.2012 , pp. 416-432
    • Choi, S.G.1    Hwang, K.-W.2    Katz, J.3    Malkin, T.4    Rubenstein, D.5
  • 7
    • 84863382720 scopus 로고    scopus 로고
    • On the Security of the "Free-XOR" Technique
    • Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
    • Choi, S.G., Katz, J., Kumaresan, R., Zhou, H.-S.: On the Security of the "Free-XOR" Technique. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 39-53. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7194 , pp. 39-53
    • Choi, S.G.1    Katz, J.2    Kumaresan, R.3    Zhou, H.-S.4
  • 8
    • 84957649042 scopus 로고
    • Committed Oblivious Transfer and Private Multiparty Computation
    • Coppersmith, D. (ed.) CRYPTO 1995. Springer, Heidelberg
    • Crépeau, C., van de Graaf, J., Tapp, A.: Committed Oblivious Transfer and Private Multiparty Computation. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 110-123. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.963 , pp. 110-123
    • Crépeau, C.1    Van De Graaf, J.2    Tapp, A.3
  • 9
    • 77955317678 scopus 로고    scopus 로고
    • Secure Multiparty AES
    • Sion, R. (ed.) FC 2010. Springer, Heidelberg
    • Damgård, I., Keller, M.: Secure Multiparty AES. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 367-374. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6052 , pp. 367-374
    • Damgård, I.1    Keller, M.2
  • 10
    • 77956992852 scopus 로고    scopus 로고
    • Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Damgård, I., Orlandi, C.: Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 558-576. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 558-576
    • Damgård, I.1    Orlandi, C.2
  • 11
    • 24144488603 scopus 로고    scopus 로고
    • Keyword Search and Oblivious Pseudo-random Functions
    • Kilian, J. (ed.) TCC 2005. Springer, Heidelberg
    • Freedman, M.J., Ishai, Y., Pinkas, B., Reingold, O.: Keyword Search and Oblivious Pseudo-random Functions. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 303-324. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3378 , pp. 303-324
    • Freedman, M.J.1    Ishai, Y.2    Pinkas, B.3    Reingold, O.4
  • 12
    • 35048837620 scopus 로고    scopus 로고
    • Efficient and Universally Composable Committed Oblivious Transfer and Applications
    • Naor, M. (ed.) TCC 2004. Springer, Heidelberg
    • Garay, J.A., MacKenzie, P., Yang, K.: Efficient and Universally Composable Committed Oblivious Transfer and Applications. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 297-316. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2951 , pp. 297-316
    • Garay, J.A.1    MacKenzie, P.2    Yang, K.3
  • 13
    • 0003979335 scopus 로고    scopus 로고
    • Cambridge University Press
    • Goldreich, O.: Foundations of Cryptography, vol. 2. Cambridge University Press (2004), http://www.wisdom.weizmann.ac.il/~oded/foc-vol2.html
    • (2004) Foundations of Cryptography , vol.2
    • Goldreich, O.1
  • 14
    • 0023545076 scopus 로고
    • How to play any mental game or a completeness theorem for protocols with honest majority
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229 (1987)
    • (1987) STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 15
    • 40249091385 scopus 로고    scopus 로고
    • OT-Combiners via Secure Computation
    • Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
    • Harnik, D., Ishai, Y., Kushilevitz, E., Nielsen, J.B.: OT-Combiners via Secure Computation. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 393-411. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4948 , pp. 393-411
    • Harnik, D.1    Ishai, Y.2    Kushilevitz, E.3    Nielsen, J.B.4
  • 18
    • 24144457853 scopus 로고    scopus 로고
    • Extending Oblivious Transfers Efficiently
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending Oblivious Transfers Efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 145-161
    • Ishai, Y.1    Kilian, J.2    Nissim, K.3    Petrank, E.4
  • 19
    • 57049124387 scopus 로고    scopus 로고
    • Cryptography with constant computational overhead
    • Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Cryptography with constant computational overhead. In: STOC, pp. 433-442 (2008)
    • (2008) STOC , pp. 433-442
    • Ishai, Y.1    Kushilevitz, E.2    Ostrovsky, R.3    Sahai, A.4
  • 20
    • 51849102397 scopus 로고    scopus 로고
    • Founding Cryptography on Oblivious Transfer - Efficiently
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Ishai, Y., Prabhakaran, M., Sahai, A.: Founding Cryptography on Oblivious Transfer - Efficiently. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 572-591. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 572-591
    • Ishai, Y.1    Prabhakaran, M.2    Sahai, A.3
  • 21
    • 70350677017 scopus 로고    scopus 로고
    • Secure Arithmetic Computation with No Honest Majority
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Ishai, Y., Prabhakaran, M., Sahai, A.: Secure Arithmetic Computation with No Honest Majority. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 294-314. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 294-314
    • Ishai, Y.1    Prabhakaran, M.2    Sahai, A.3
  • 22
    • 77956992754 scopus 로고    scopus 로고
    • Efficient Implementation of the Orlandi Protocol
    • Zhou, J., Yung, M. (eds.) ACNS 2010. Springer, Heidelberg
    • Jakobsen, T.P., Makkes, M.X., Nielsen, J.D.: Efficient Implementation of the Orlandi Protocol. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 255-272. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6123 , pp. 255-272
    • Jakobsen, T.P.1    Makkes, M.X.2    Nielsen, J.D.3
  • 23
    • 49049099825 scopus 로고    scopus 로고
    • Improved Garbled Circuit: Free XOR Gates and Applications
    • Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
    • Kolesnikov, V., Schneider, T.: Improved Garbled Circuit: Free XOR Gates and Applications. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 486-498. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5126 , pp. 486-498
    • Kolesnikov, V.1    Schneider, T.2
  • 24
    • 80052009576 scopus 로고    scopus 로고
    • The IPS Compiler: Optimizations, Variants and Concrete Efficiency
    • Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
    • Lindell, Y., Oxman, E., Pinkas, B.: The IPS Compiler: Optimizations, Variants and Concrete Efficiency. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 259-276. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6841 , pp. 259-276
    • Lindell, Y.1    Oxman, E.2    Pinkas, B.3
  • 25
    • 79953241261 scopus 로고    scopus 로고
    • Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
    • Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
    • Lindell, Y., Pinkas, B.: Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 329-346. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6597 , pp. 329-346
    • Lindell, Y.1    Pinkas, B.2
  • 26
    • 52149120767 scopus 로고    scopus 로고
    • Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
    • Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. Springer, Heidelberg
    • Lindell, Y., Pinkas, B., Smart, N.P.: Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 2-20. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5229 , pp. 2-20
    • Lindell, Y.1    Pinkas, B.2    Smart, N.P.3
  • 27
    • 80054814127 scopus 로고    scopus 로고
    • VMCrypt - Modular software architecture for scalable secure computation
    • ePrint Archive, Report 2010/584
    • Malka, L., Katz, J.: VMCrypt - modular software architecture for scalable secure computation. Cryptology ePrint Archive, Report 2010/584 (2010), http://eprint.iacr.org/
    • (2010) Cryptology
    • Malka, L.1    Katz, J.2
  • 29
    • 84865485231 scopus 로고    scopus 로고
    • Extending oblivious transfers efficiently - How to get robustness almost for free
    • ePrint Archive, Report 2007/215
    • Nielsen, J.B.: Extending oblivious transfers efficiently - how to get robustness almost for free. Cryptology ePrint Archive, Report 2007/215 (2007), http://eprint.iacr.org/
    • (2007) Cryptology
    • Nielsen, J.B.1
  • 30
    • 70350634167 scopus 로고    scopus 로고
    • LEGO for Two-Party Secure Computation
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Nielsen, J.B., Orlandi, C.: LEGO for Two-Party Secure Computation. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 368-386. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 368-386
    • Nielsen, J.B.1    Orlandi, C.2
  • 31
    • 72449131818 scopus 로고    scopus 로고
    • Secure Two-Party Computation Is Practical
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Pinkas, B., Schneider, T., Smart, N.P., Williams, S.C.: Secure Two-Party Computation Is Practical. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 250-267. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 250-267
    • Pinkas, B.1    Schneider, T.2    Smart, N.P.3    Williams, S.C.4
  • 32
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • extended abstract
    • Yao, A.C.-C.: Protocols for secure computations (extended abstract). In: FOCS, pp. 160-164 (1982)
    • (1982) FOCS , pp. 160-164
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.