메뉴 건너뛰기




Volumn 25, Issue 4, 2012, Pages 680-722

Secure two-party computation via cut-and-choose oblivious transfer

Author keywords

Concrete efficiency; Cut and choose; Malicious adversaries; Secure two party computation

Indexed keywords

CONCRETE ANALYSIS; CUT-AND-CHOOSE; EFFICIENT CONSTRUCTION; MALICIOUS ADVERSARIES; OBLIVIOUS TRANSFER; SECURE TWO-PARTY COMPUTATIONS; SECURITY PROPERTIES; TWO-PARTY COMPUTATION;

EID: 84869506354     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/s00145-011-9107-0     Document Type: Article
Times cited : (93)

References (41)
  • 1
    • 73849126104 scopus 로고    scopus 로고
    • Security against covert adversaries: Efficient protocols for realistic adversaries
    • Y. Aumann, Y. Lindell, Security against covert adversaries: Efficient protocols for realistic adversaries. J. Cryptol. 23(2), 281-343 (2010)
    • (2010) J. Cryptol. , vol.23 , Issue.2 , pp. 281-343
    • Aumann, Y.1    Lindell, Y.2
  • 2
    • 85029542707 scopus 로고
    • Foundations of secure interactive computing
    • Springer, Berlin
    • D. Beaver, Foundations of secure interactive computing, in CRYPTO'91. LNCS, vol. 576(Springer, Berlin, 1991), pp. 377-391
    • (1991) CRYPTO'91. LNCS , vol.576 , pp. 377-391
    • Beaver, D.1
  • 3
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multi-party cryptographic protocols
    • R. Canetti, Security and composition of multi-party cryptographic protocols. J. Cryptol. 13(1), 143-202 (2000)
    • (2000) J. Cryptol. , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 4
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • R. Canetti, Universally composable security: A new paradigm for cryptographic protocols, in 42nd FOCS (2001), pp. 136-145. Full version available at http://eprint.iacr.org/2000/067
    • (2001) 42nd FOCS , pp. 136-145
    • Canetti, R.1
  • 5
    • 84880897758 scopus 로고    scopus 로고
    • Universally composable commitments
    • Springer, Berlin
    • R. Canetti, M. Fischlin, Universally composable commitments, in CRYPTO 2001. LNCS, vol. 2139(Springer, Berlin, 2001), pp. 19-40
    • (2001) CRYPTO 2001. LNCS , vol.2139 , pp. 19-40
    • Canetti, R.1    Fischlin, M.2
  • 6
    • 0018456171 scopus 로고
    • Universal classes of Hash functions
    • L. Carter, M. N. Wegman, Universal classes of Hash functions. J. Comput. Syst. Sci. 18(2), 143-154 (1979)
    • (1979) J. Comput. Syst. Sci. , vol.18 , Issue.2 , pp. 143-154
    • Carter, L.1    Wegman, M.N.2
  • 7
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of Witness hiding protocols
    • Springer, Berlin
    • R. Cramer, I. Damgård, B. Schoenmakers, Proofs of partial knowledge and simplified design of Witness hiding protocols, in CRYPTO'94. LNCS, vol. 839(Springer, Berlin, 1994), pp. 174-187
    • (1994) CRYPTO'94. LNCS , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 9
    • 35048839833 scopus 로고    scopus 로고
    • Randomness extraction and key derivation using the CBC, cascade and HMAC modes
    • Springer, Berlin
    • Y. Dodis, R. Gennaro, J. Hastad, H. Krawczyk, T. Rabin, Randomness extraction and key derivation using the CBC, cascade and HMAC modes, in CRYPTO 2004. LNCS, vol. 3152(Springer, Berlin, 2004), pp. 494-510
    • (2004) CRYPTO 2004. LNCS , vol.3152 , pp. 494-510
    • Dodis, Y.1    Gennaro, R.2    Hastad, J.3    Krawczyk, H.4    Rabin, T.5
  • 10
    • 51849131499 scopus 로고    scopus 로고
    • Efficient constructions of composable commitments and zero-knowledge proofs
    • Springer, Berlin
    • Y. Dodis, V. Shoup, S. Walfish, Efficient constructions of composable commitments and zero-knowledge proofs, in CRYPTO 2008. LNCS, vol. 5157(Springer, Berlin, 2008), pp. 515-535
    • (2008) CRYPTO 2008. LNCS , vol.5157 , pp. 515-535
    • Dodis, Y.1    Shoup, V.2    Walfish, S.3
  • 11
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • S. Even, O. Goldreich, A. Lempel, A randomized protocol for signing contracts. Commun. ACM 28(6), 637-647 (1985)
    • (1985) Commun. ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 12
    • 35248886595 scopus 로고    scopus 로고
    • Strengthening zero-knowledge protocols using signatures
    • Springer, Berlin
    • J. Garay, P. MacKenzie, K. Yang. Strengthening zero-knowledge protocols using signatures, in EUROCRYPT 2003. LNCS, vol. 2656(Springer, Berlin, 2003), pp. 177-194
    • (2003) EUROCRYPT 2003. LNCS , vol.2656 , pp. 177-194
    • Garay, J.1    MacKenzie, P.2    Yang, K.3
  • 14
    • 0023545076 scopus 로고
    • How to play any mental game-A completeness theorem for protocols with honest majority
    • Chap. 7
    • O. Goldreich, S. Micali, A. Wigderson, How to play any mental game-A completeness theorem for protocols with honest majority, in 19th STOC (1987), pp. 218-229. For details see [13, Chap. 7]
    • (1987) 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 15
    • 84955564077 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • Spring, Berlin
    • S. Goldwasser, L. Levin, Fair computation of general functions in presence of immoral majority, in CRYPTO'90. LNCS, vol. 537(Spring, Berlin, 1990), pp. 77-93
    • (1990) CRYPTO'90. LNCS , vol.537 , pp. 77-93
    • Goldwasser, S.1    Levin, L.2
  • 16
    • 44449160882 scopus 로고    scopus 로고
    • Efficient two party and multi party computation against covert adversaries
    • Springer, Berlin
    • V. Goyal, P. Mohassel, A. Smith. Efficient two party and multi party computation against covert adversaries, in EUROCRYPT2008. LNCS, vol. 4965(Springer, Berlin, 2008), pp. 289-306
    • (2008) EUROCRYPT2008. LNCS , vol.4965 , pp. 289-306
    • Goyal, V.1    Mohassel, P.2    Smith, A.3
  • 18
    • 0345253860 scopus 로고    scopus 로고
    • Construction of a pseudo-random generator from any one-way function
    • J. Hastad, R. Impagliazzo, L. Levin, M. Luby, Construction of a pseudo-random generator from any one-way function. SIAM J. Comput. 28(4), 1364-1396 (1999)
    • (1999) SIAM J. Comput. , vol.28 , Issue.4 , pp. 1364-1396
    • Hastad, J.1    Impagliazzo, R.2    Levin, L.3    Luby, M.4
  • 20
    • 79955547393 scopus 로고    scopus 로고
    • Efficient set operations in the presence of malicious adversaries
    • Springer, Berlin
    • C. Hazay, K. Nissim, Efficient set operations in the presence of malicious adversaries, in PKC 2010. LNCS, vol. 6056(Springer, Berlin, 2010), pp. 312-331
    • (2010) PKC 2010. LNCS , vol.6056 , pp. 312-331
    • Hazay, C.1    Nissim, K.2
  • 21
    • 51849102397 scopus 로고    scopus 로고
    • Founding cryptography on oblivious transfer-Efficiently
    • Springer, Berlin
    • Y. Ishai, M. Prabhakaran, A. Sahai, Founding cryptography on oblivious transfer-Efficiently, in CRYPTO 2008. LNCS, vol. 5157(Springer, Berlin, 2008), pp. 572-591
    • (2008) CRYPTO 2008. LNCS , vol.5157 , pp. 572-591
    • Ishai, Y.1    Prabhakaran, M.2    Sahai, A.3
  • 22
    • 70350677017 scopus 로고    scopus 로고
    • Secure arithmetic computation with no honest majority
    • Springer, Berlin
    • Y. Ishai, M. Prabhakaran, A. Sahai, Secure arithmetic computation with no honest majority, in TCC 2009. LNCS, vol. 5444(Springer, Berlin, 2009), pp. 294-314
    • (2009) TCC 2009. LNCS , vol.5444 , pp. 294-314
    • Ishai, Y.1    Prabhakaran, M.2    Sahai, A.3
  • 23
    • 38049136533 scopus 로고    scopus 로고
    • Efficient two-party secure computation on committed inputs
    • Springer, Berlin
    • S. Jarecki, V. Shmatikov, Efficient two-party secure computation on committed inputs, in EUROCRYPT 2007. LNCS, vol. 4515(Springer, Berlin, 2007), pp. 97-114
    • (2007) EUROCRYPT 2007. LNCS , vol.4515 , pp. 97-114
    • Jarecki, S.1    Shmatikov, V.2
  • 25
    • 49049099825 scopus 로고    scopus 로고
    • Improved garbled circuit: Free XOR gates and applications
    • Springer, Berlin
    • V. Kolesnikov, T. Schneider, Improved garbled circuit: Free XOR gates and applications, in 35th ICALP. LNCS, vol. 5126(Springer, Berlin, 2008), pp. 486-498
    • (2008) 35th ICALP. LNCS , vol.5126 , pp. 486-498
    • Kolesnikov, V.1    Schneider, T.2
  • 26
    • 4544235438 scopus 로고    scopus 로고
    • Parallel coin-tossing and constant-round secure two-party computation
    • Y. Lindell, Parallel coin-tossing and constant-round secure two-party computation. J. Cryptol. 16(3), 143-184 (2003)
    • (2003) J. Cryptol. , vol.16 , Issue.3 , pp. 143-184
    • Lindell, Y.1
  • 27
    • 79957976152 scopus 로고    scopus 로고
    • Highly-efficient universally-composable commitments
    • Springer, Berlin
    • Y. Lindell, Highly-efficient universally-composable commitments, in EUROCRYPT 2011. LNCS, vol. 6632(Springer, Berlin, 2011), pp. 446-466
    • (2011) EUROCRYPT 2011. LNCS , vol.6632 , pp. 446-466
    • Lindell, Y.1
  • 28
    • 38049136534 scopus 로고    scopus 로고
    • An efficient protocol for secure two-party computation in the presence of malicious adversaries
    • Springer, Berlin
    • Y. Lindell, B. Pinkas, An efficient protocol for secure two-party computation in the presence of malicious adversaries, in EUROCRYPT2007. LNCS, vol. 4515(Springer, Berlin, 2007), pp. 52-78
    • (2007) EUROCRYPT2007. LNCS , vol.4515 , pp. 52-78
    • Lindell, Y.1    Pinkas, B.2
  • 29
    • 64249101946 scopus 로고    scopus 로고
    • A proof of Yao's protocol for secure two-party computation
    • Y. Lindell, B. Pinkas, A proof of Yao's protocol for secure two-party computation. J. Cryptol. 22(2), 161-188 (2009)
    • (2009) J. Cryptol. , vol.22 , Issue.2 , pp. 161-188
    • Lindell, Y.1    Pinkas, B.2
  • 30
    • 35048882590 scopus 로고    scopus 로고
    • On simulation-sound trapdoor commitments
    • Springer, Berlin
    • P. MacKenzie, K. Yang, On simulation-sound trapdoor commitments, in EUROCRYPT 2004. LNCS, vol. 3027(Springer, Berlin, 2004), pp. 382-400
    • (2004) EUROCRYPT 2004. LNCS , vol.3027 , pp. 382-400
    • MacKenzie, P.1    Yang, K.2
  • 32
    • 84974655726 scopus 로고
    • Secure computation. Unpublished manuscript, 1992
    • Springer, Berlin
    • S. Micali, P. Rogaway, Secure computation. Unpublished manuscript, 1992. Preliminary version in CRYPTO'91, LNCS, vol. 576(Springer, Berlin, 1991), pp. 392-404
    • (1991) Preliminary Version in CRYPTO'91, LNCS , vol.576 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 33
    • 33745843587 scopus 로고    scopus 로고
    • Efficiency tradeoffs for malicious two-party computation
    • Springer, Berlin
    • P. Mohassel, M. K. Franklin, Efficiency tradeoffs for malicious two-party computation, in 9th PKC Conference. LNCS, vol. 3958(Springer, Berlin, 2006), pp. 458-473
    • (2006) 9th PKC Conference. LNCS , vol.3958 , pp. 458-473
    • Mohassel, P.1    Franklin, M.K.2
  • 34
    • 0029510686 scopus 로고
    • Synthesizers and their application to the parallel construction of pseudo-random functions
    • M. Naor, O. Reingold, Synthesizers and their application to the parallel construction of pseudo-random functions, in 36th FOCS (1995), pp. 170-181
    • (1995) 36th FOCS , pp. 170-181
    • Naor, M.1    Reingold, O.2
  • 35
    • 70350634167 scopus 로고    scopus 로고
    • LEGO for two-party secure computation
    • Springer, Berlin
    • J. B. Nielsen, C. Orlandi, LEGO for two-party secure computation, in TCC 2009. LNCS, vol. 5444(Springer, Berlin, 2009), pp. 368-386
    • (2009) TCC 2009. LNCS , vol.5444 , pp. 368-386
    • Nielsen, J.B.1    Orlandi, C.2
  • 37
    • 51849126892 scopus 로고    scopus 로고
    • A framework for efficient and composable oblivious transfer
    • Springer, Berlin
    • C. Peikert, V. Vaikuntanathan, B. Waters, A framework for efficient and composable oblivious transfer, in CRYPTO'08. LNCS, vol. 5157(Springer, Berlin, 2008), pp. 554-571
    • (2008) CRYPTO'08. LNCS , vol.5157 , pp. 554-571
    • Peikert, C.1    Vaikuntanathan, V.2    Waters, B.3
  • 38
  • 39
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Aiken Computation Laboratory, Harvard U.
    • M. Rabin, How to exchange secrets by oblivious transfer. Tech. Memo TR-81, Aiken Computation Laboratory, Harvard U., 1981
    • (1981) Tech. Memo TR-81
    • Rabin, M.1
  • 40
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, How to share a secret. Commun. ACM 22(11), 612-613 (1979)
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 41
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. C. Yao, How to generate and exchange secrets, in 27th FOCS (1986), pp. 162-167
    • (1986) 27th FOCS , pp. 162-167
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.