메뉴 건너뛰기




Volumn 7778 LNCS, Issue , 2013, Pages 461-478

Rate-limited secure function evaluation: Definitions and constructions

Author keywords

foundations; oblivious polynomial evaluation; oracle attacks; secure function evaluation; secure metering

Indexed keywords

CLIENT-SERVER APPLICATIONS; GENERAL APPROACH; OBLIVIOUS POLYNOMIAL EVALUATION; ORACLE ATTACKS; SECURE FUNCTION EVALUATION; SECURE METERING; SERVICE PROVIDER; STEPPING STONE; THE STANDARD MODEL;

EID: 84873949927     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-36362-7_28     Document Type: Conference Paper
Times cited : (9)

References (30)
  • 1
    • 70350399649 scopus 로고    scopus 로고
    • Secure Evaluation of Private Linear Branching Programs with Medical Applications
    • Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
    • Barni, M., Failla, P., Kolesnikov, V., Lazzeretti, R., Sadeghi, A.-R., Schneider, T.: Secure Evaluation of Private Linear Branching Programs with Medical Applications. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 424-439. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5789 , pp. 424-439
    • Barni, M.1    Failla, P.2    Kolesnikov, V.3    Lazzeretti, R.4    Sadeghi, A.-R.5    Schneider, T.6
  • 2
    • 85014508412 scopus 로고
    • Multiparty Computation with Faulty Majority
    • Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
    • Beaver, D., Goldwasser, S.: Multiparty Computation with Faulty Majority. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 589-590. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 589-590
    • Beaver, D.1    Goldwasser, S.2
  • 3
    • 84873965610 scopus 로고    scopus 로고
    • Distributed private data analysis: On simultaneously solving how and what
    • abs/1103.2626
    • Beimel, A., Nissim, K., Omri, E.: Distributed private data analysis: On simultaneously solving how and what. CoRR, abs/1103.2626 (2011)
    • (2011) CoRR
    • Beimel, A.1    Nissim, K.2    Omri, E.3
  • 4
    • 85024585723 scopus 로고
    • Incremental Cryptography: The Case of Hashing and Signing
    • Desmedt, Y.G. (ed.) CRYPTO 1994. Springer, Heidelberg
    • Bellare, M., Goldreich, O., Goldwasser, S.: Incremental Cryptography: The Case of Hashing and Signing. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 216-233. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.839 , pp. 216-233
    • Bellare, M.1    Goldreich, O.2    Goldwasser, S.3
  • 5
    • 57049188348 scopus 로고    scopus 로고
    • Sharemind: A Framework for Fast Privacy-Preserving Computations
    • Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
    • Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A Framework for Fast Privacy-Preserving Computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192-206. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 192-206
    • Bogdanov, D.1    Laur, S.2    Willemson, J.3
  • 6
    • 84873942693 scopus 로고    scopus 로고
    • Deploying secure multiparty computation for financial data analysis
    • Technical report, ePrint, 2011/662
    • Bogdanov, D., Talviste, R., Willemson, J.: Deploying secure multiparty computation for financial data analysis. Technical report, Cryptology ePrint, 2011/662
    • Cryptology
    • Bogdanov, D.1    Talviste, R.2    Willemson, J.3
  • 9
    • 84947955350 scopus 로고
    • Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer
    • Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
    • Chaum, D., van Heijst, E., Pfitzmann, B.: Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 470-484. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 470-484
    • Chaum, D.1    Van Heijst, E.2    Pfitzmann, B.3
  • 10
    • 85016672373 scopus 로고
    • Proof of Partial Knowledge and Simplified Design of Witness Hiding Protocols
    • Desmedt, Y.G. (ed.) CRYPTO 1994. Springer, Heidelberg
    • Cramer, R., Damgård, I., Schoenmakers, B.: Proof of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174-187. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 11
    • 84873963176 scopus 로고    scopus 로고
    • Rate-Limited Secure Function Evaluation: Definitions and Constructions
    • ePrint, Report 201X/XXX
    • Dagdelen, Ö., Mohassel, P., Venturi, D.: Rate-Limited Secure Function Evaluation: Definitions and Constructions. Cryptology ePrint, Report 201X/XXX
    • Cryptology
    • Dagdelen, Ö.1    Mohassel, P.2    Venturi, D.3
  • 12
    • 67049134126 scopus 로고    scopus 로고
    • Asynchronous Multiparty Computation: Theory and Implementation
    • Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
    • Damgård, I., Geisler, M., Krøigaard, M., Nielsen, J.B.: Asynchronous Multiparty Computation: Theory and Implementation. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 160-179. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 160-179
    • Damgård, I.1    Geisler, M.2    Krøigaard, M.3    Nielsen, J.B.4
  • 13
    • 24144488603 scopus 로고    scopus 로고
    • Keyword search and oblivious pseudorandom functions
    • Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
    • Freedman, M.J., Ishai, Y., Pinkas, B., Reingold, O.: Keyword Search and Oblivious Pseudorandom Functions. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 303-324. Springer, Heidelberg (2005) (Pubitemid 41231171)
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 303-324
    • Freedman, M.J.1    Ishai, Y.2    Pinkas, B.3    Reingold, O.4
  • 14
    • 84873972913 scopus 로고    scopus 로고
    • Automata evaluation and text search protocols with simulation based security
    • ePrint, Report 2010/484
    • Gennaro, R., Hazay, C., Sorensen, F.: Automata evaluation and text search protocols with simulation based security. Cryptology ePrint, Report 2010/484
    • Cryptology
    • Gennaro, R.1    Hazay, C.2    Sorensen, F.3
  • 16
    • 84924354505 scopus 로고    scopus 로고
    • Efficient oblivious polynomial evaluation with simulation-based security
    • Technical report, ePrint, Report 2009/459
    • Hazay, C., Lindell, Y.: Efficient oblivious polynomial evaluation with simulation-based security. Technical report, Cryptology ePrint, Report 2009/459
    • Cryptology
    • Hazay, C.1    Lindell, Y.2
  • 17
    • 40249108370 scopus 로고    scopus 로고
    • Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
    • Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
    • Hazay, C., Lindell, Y.: Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4948 , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 18
    • 79955547393 scopus 로고    scopus 로고
    • Efficient Set Operations in the Presence of Malicious Adversaries
    • Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
    • Hazay, C., Nissim, K.: Efficient Set Operations in the Presence of Malicious Adversaries. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 312-331. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6056 , pp. 312-331
    • Hazay, C.1    Nissim, K.2
  • 19
    • 78650837624 scopus 로고    scopus 로고
    • Computationally Secure Pattern Matching in the Presence of Malicious Adversaries
    • Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
    • Hazay, C., Toft, T.: Computationally Secure Pattern Matching in the Presence of Malicious Adversaries. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 195-212. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6477 , pp. 195-212
    • Hazay, C.1    Toft, T.2
  • 21
    • 84914127581 scopus 로고    scopus 로고
    • Faster secure two-party computation using garbled circuits
    • Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. In: USENIX Security (2011)
    • (2011) USENIX Security
    • Huang, Y.1    Evans, D.2    Katz, J.3    Malka, L.4
  • 22
    • 38049046515 scopus 로고    scopus 로고
    • Evaluating Branching Programs on Encrypted Data
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Ishai, Y., Paskin, A.: Evaluating Branching Programs on Encrypted Data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 575-594. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 575-594
    • Ishai, Y.1    Paskin, A.2
  • 23
    • 38049136533 scopus 로고    scopus 로고
    • Efficient Two-Party Secure Computation on Committed Inputs
    • Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
    • Jarecki, S., Shmatikov, V.: Efficient Two-Party Secure Computation on Committed Inputs. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 97-114. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 97-114
    • Jarecki, S.1    Shmatikov, V.2
  • 27
    • 84862483119 scopus 로고    scopus 로고
    • Oblivious keyword search
    • Technical report, ePrint, Report 2002/182
    • Ogata, W., Kurosawa, K.: Oblivious keyword search. Technical report, Cryptology ePrint, Report 2002/182
    • Cryptology
    • Ogata, W.1    Kurosawa, K.2
  • 28
    • 57049083569 scopus 로고    scopus 로고
    • Privacy preserving error resilient DNA searching through oblivious automata
    • Troncoso-Pastoriza, J., Katzenbeisser, S., Celik, M.: Privacy preserving error resilient DNA searching through oblivious automata. In: ACM CCS, pp. 519-528 (2007)
    • (2007) ACM CCS , pp. 519-528
    • Troncoso-Pastoriza, J.1    Katzenbeisser, S.2    Celik, M.3
  • 29
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • extended abstract
    • Yao, A.C.: Protocols for secure computations (extended abstract). In: FOCS, pp. 160-164 (1982)
    • (1982) FOCS , pp. 160-164
    • Yao, A.C.1
  • 30
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • extended abstract
    • Yao, A.C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162-167 (1986)
    • (1986) FOCS , pp. 162-167
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.