메뉴 건너뛰기




Volumn 7658 LNCS, Issue , 2012, Pages 681-698

Calling out cheaters: Covert security with public verifiability

Author keywords

[No Author keywords available]

Indexed keywords

PUBLIC VERIFIABILITY; SECURE TWO-PARTY COMPUTATIONS; SECURITY MODEL; THIRD PARTIES;

EID: 84871564300     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-34961-4_41     Document Type: Conference Paper
Times cited : (32)

References (13)
  • 1
    • 38049082907 scopus 로고    scopus 로고
    • Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
    • Vadhan, S.P. (ed.) TCC 2007 Springer, Heidelberg
    • Aumann, Y., Lindell, Y.: Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137-156. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 137-156
    • Aumann, Y.1    Lindell, Y.2
  • 2
    • 17744381610 scopus 로고    scopus 로고
    • Universally composable protocols with relaxed set-up assumptions
    • IEEE Computer Society
    • Barak, B., Canetti, R., Nielsen, J.B., Pass, R.: Universally composable protocols with relaxed set-up assumptions. In: FOCS, pp. 186-195. IEEE Computer Society (2004)
    • (2004) FOCS , pp. 186-195
    • Barak, B.1    Canetti, R.2    Nielsen, J.B.3    Pass, R.4
  • 3
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • Canetti, R.: Security and composition of multiparty cryptographic protocols. J. Cryptology 13(1), 143-202 (2000)
    • (2000) J. Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 4
    • 77949608607 scopus 로고    scopus 로고
    • From Passive to Covert Security at Low Cost
    • Micciancio, D. (ed.) TCC 2010 Springer, Heidelberg
    • Damgård, I., Geisler, M., Nielsen, J.B.: From Passive to Covert Security at Low Cost. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 128-145. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 128-145
    • Damgård, I.1    Geisler, M.2    Nielsen, J.B.3
  • 5
    • 0026985378 scopus 로고
    • Communication complexity of secure computation
    • extended abstract
    • Franklin, M.K., Yung, M.: Communication complexity of secure computation (extended abstract). In: STOC, pp. 699-710 (1992)
    • (1992) STOC , pp. 699-710
    • Franklin, M.K.1    Yung, M.2
  • 6
    • 44449160882 scopus 로고    scopus 로고
    • Efficient Two Party and Multi Party Computation Against Covert Adversaries
    • Smart, N.P. (ed.) EUROCRYPT 2008 Springer, Heidelberg
    • Goyal, V., Mohassel, P., Smith, A.: Efficient Two Party and Multi Party Computation Against Covert Adversaries. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 289-306. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 289-306
    • Goyal, V.1    Mohassel, P.2    Smith, A.3
  • 7
    • 33645593031 scopus 로고    scopus 로고
    • Foundations of Cryptography
    • Cambridge University Press
    • Goldreich, O.: Foundations of Cryptography, Basic Applications, vol. 2. Cambridge University Press (2004)
    • (2004) Basic Applications , vol.2
    • Goldreich, O.1
  • 8
    • 40249108370 scopus 로고    scopus 로고
    • Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
    • Canetti, R. (ed.) TCC 2008 Springer, Heidelberg
    • Hazay, C., Lindell, Y.: Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4948 , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 10
    • 24144457853 scopus 로고    scopus 로고
    • Extending Oblivious Transfers Efficiently
    • Boneh, D. (ed.) CRYPTO 2003 Springer, Heidelberg
    • Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending Oblivious Transfers Efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 145-161
    • Ishai, Y.1    Kilian, J.2    Nissim, K.3    Petrank, E.4
  • 11
    • 64249101946 scopus 로고    scopus 로고
    • A proof of security of yao's protocol for two-party computation
    • Lindell, Y., Pinkas, B.: A proof of security of yao's protocol for two-party computation. J. Cryptology 22(2), 161-188 (2009)
    • (2009) J. Cryptology , vol.22 , Issue.2 , pp. 161-188
    • Lindell, Y.1    Pinkas, B.2
  • 13
    • 51849126892 scopus 로고    scopus 로고
    • A Framework for Efficient and Composable Oblivious Transfer
    • Wagner, D. (ed.) CRYPTO 2008 Springer, Heidelberg
    • Peikert, C., Vaikuntanathan, V., Waters, B.: A Framework for Efficient and Composable Oblivious Transfer. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 554-571. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 554-571
    • Peikert, C.1    Vaikuntanathan, V.2    Waters, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.