메뉴 건너뛰기




Volumn 7785 LNCS, Issue , 2013, Pages 162-181

Garbling XOR gates "for free" in the standard model

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC ASSUMPTIONS; CRYPTOGRAPHIC OPERATIONS; ENCRYPTION SCHEMES; GARBLED CIRCUITS; LEARNING PARITY WITH NOISE; NON-TRIVIAL; PERFORMANCE IMPROVEMENTS; RANDOM ORACLE; RANDOM ORACLE MODEL; RELATED KEYS; SCHNEIDER; SYMMETRIC ENCRYPTION; THE STANDARD MODEL; XOR GATES;

EID: 84873969684     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-36594-2_10     Document Type: Conference Paper
Times cited : (16)

References (45)
  • 1
    • 79956298358 scopus 로고    scopus 로고
    • Randomly Encoding Functions: A New Cryptographic Paradigm
    • (Invited Talk). Fehr, S. (ed.) ICITS 2011. Springer, Heidelberg
    • Applebaum, B.: Randomly Encoding Functions: A New Cryptographic Paradigm (Invited Talk). In: Fehr, S. (ed.) ICITS 2011. LNCS, vol. 6673, pp. 25-31. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6673 , pp. 25-31
    • Applebaum, B.1
  • 2
    • 70350342511 scopus 로고    scopus 로고
    • Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595-618. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 595-618
    • Applebaum, B.1    Cash, D.2    Peikert, C.3    Sahai, A.4
  • 3
    • 80051980769 scopus 로고    scopus 로고
    • Semantic security under related-key attacks and applications
    • Applebaum, B., Harnik, D., Ishai, Y.: Semantic security under related-key attacks and applications. In: ICS, pp. 45-60 (2011)
    • (2011) ICS , pp. 45-60
    • Applebaum, B.1    Harnik, D.2    Ishai, Y.3
  • 4
    • 33745306666 scopus 로고    scopus 로고
    • Computationally private randomizing polynomials and their applications
    • Applebaum, B., Ishai, Y., Kushilevitz, E.: Computationally private randomizing polynomials and their applications. Computional Complexity 15(2), 115-162 (2006);
    • (2006) Computional Complexity , vol.15 , Issue.2 , pp. 115-162
    • Applebaum, B.1    Ishai, Y.2    Kushilevitz, E.3
  • 6
    • 84863309994 scopus 로고    scopus 로고
    • How to garble arithmetic circuits
    • Applebaum, B., Ishai, Y., Kushilevitz, E.: How to garble arithmetic circuits. In: FOCS, pp. 120-129 (2011)
    • (2011) FOCS , pp. 120-129
    • Applebaum, B.1    Ishai, Y.2    Kushilevitz, E.3
  • 7
    • 77957013831 scopus 로고    scopus 로고
    • Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Bellare, M., Cash, D.: Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 666-684. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 666-684
    • Bellare, M.1    Cash, D.2
  • 9
    • 35248860702 scopus 로고    scopus 로고
    • A Theoretical Treatment of Related-Key Attacks: RKAPRPs, RKA-PRFs, and Applications
    • Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
    • Bellare, M., Kohno, T.: A Theoretical Treatment of Related-Key Attacks: RKAPRPs, RKA-PRFs, and Applications. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 491-506. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 491-506
    • Bellare, M.1    Kohno, T.2
  • 11
    • 35248822352 scopus 로고    scopus 로고
    • Encryption-scheme security in the presence of key-dependent messages
    • Nyberg, K., Heys, H.M. (eds.) SAC 2002. Springer, Heidelberg
    • Black, J., Rogaway, P., Shrimpton, T.: Encryption-scheme security in the presence of key-dependent messages. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 62-75. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2595 , pp. 62-75
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 12
    • 84877639283 scopus 로고
    • Cryptographic Primitives Based on Hard Learning Problems
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg citeseer.nj.nec.com/blum94cryptographic.html
    • Blum, A., Furst, M., Kearns, M., Lipton, R.J.: Cryptographic Primitives Based on Hard Learning Problems. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 278-291. Springer, Heidelberg (1994), citeseer.nj.nec.com/ blum94cryptographic.html
    • (1994) LNCS , vol.773 , pp. 278-291
    • Blum, A.1    Furst, M.2    Kearns, M.3    Lipton, R.J.4
  • 13
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput. 13, 850-864 (1984);
    • (1984) SIAM J. Comput. , vol.13 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 15
    • 51849118137 scopus 로고    scopus 로고
    • Circular-Secure Encryption from Decision Diffie-Hellman
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Boneh, D., Halevi, S., Hamburg, M., Ostrovsky, R.: Circular-Secure Encryption from Decision Diffie-Hellman. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 108-125. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 108-125
    • Boneh, D.1    Halevi, S.2    Hamburg, M.3    Ostrovsky, R.4
  • 16
    • 84945135810 scopus 로고    scopus 로고
    • An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
    • Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
    • Camenisch, J.L., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 93-118
    • Camenisch, J.L.1    Lysyanskaya, A.2
  • 18
    • 84863382720 scopus 로고    scopus 로고
    • On the Security of the "Free-XOR" Technique
    • Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
    • Choi, S.G., Katz, J., Kumaresan, R., Zhou, H.-S.: On the Security of the "Free-XOR" Technique. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 39-53. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7194 , pp. 39-53
    • Choi, S.G.1    Katz, J.2    Kumaresan, R.3    Zhou, H.-S.4
  • 19
    • 49149109143 scopus 로고    scopus 로고
    • How to Encrypt with the LPN Problem
    • Aceto, L., Damgård, I.B., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
    • Gilbert, H., Robshaw, M.J.B., Seurin, Y.: How to Encrypt with the LPN Problem. In: Aceto, L., Damgård, I.B., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 679-690. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5126 , pp. 679-690
    • Gilbert, H.1    Robshaw, M.J.B.2    Seurin, Y.3
  • 20
    • 0027797493 scopus 로고
    • On the existence of pseudorandom generators
    • Goldreich, O., Krawczyk, H., Luby, M.: On the existence of pseudorandom generators. SIAM J. Comput. 22(6), 1163-1175 (1993);
    • (1993) SIAM J. Comput. , vol.22 , Issue.6 , pp. 1163-1175
    • Goldreich, O.1    Krawczyk, H.2    Luby, M.3
  • 22
  • 23
    • 0345253860 scopus 로고    scopus 로고
    • A pseudorandom generator from any one-way function
    • Håstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM J. Comput. 28(4), 1364-1396 (1999)
    • (1999) SIAM J. Comput. , vol.28 , Issue.4 , pp. 1364-1396
    • Håstad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 24
  • 26
    • 81855220955 scopus 로고    scopus 로고
    • Efficient Secure Computation with Garbled Circuits
    • Jajodia, S., Mazumdar, C. (eds.) ICISS 2011. Springer, Heidelberg
    • Huang, Y., Shen, C.-H., Evans, D., Katz, J., Shelat, A.: Efficient Secure Computation with Garbled Circuits. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2011. LNCS, vol. 7093, pp. 28-48. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7093 , pp. 28-48
    • Huang, Y.1    Shen, C.-H.2    Evans, D.3    Katz, J.4    Shelat, A.5
  • 27
    • 24144457853 scopus 로고    scopus 로고
    • Extending Oblivious Transfers Efficiently
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending Oblivious Transfers Efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 145-161
    • Ishai, Y.1    Kilian, J.2    Nissim, K.3    Petrank, E.4
  • 28
    • 0034507841 scopus 로고    scopus 로고
    • Randomizing polynomials: A new representation with applications to round-efficient secure computation
    • citeseer.nj.nec.com/ishai00randomizing.html
    • Ishai, Y., Kushilevitz, E.: Randomizing polynomials: A new representation with applications to round-efficient secure computation. In: Proc. 41st FOCS, pp. 294-304 (2000), citeseer.nj.nec.com/ishai00randomizing.html
    • (2000) Proc. 41st FOCS , pp. 294-304
    • Ishai, Y.1    Kushilevitz, E.2
  • 29
    • 71549170830 scopus 로고    scopus 로고
    • Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
    • Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
    • Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 1-20. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5888 , pp. 1-20
    • Kolesnikov, V.1    Sadeghi, A.-R.2    Schneider, T.3
  • 30
    • 49049099825 scopus 로고    scopus 로고
    • Improved Garbled Circuit: Free XOR Gates and Applications
    • Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
    • Kolesnikov, V., Schneider, T.: Improved Garbled Circuit: Free XOR Gates and Applications. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 486-498. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5126 , pp. 486-498
    • Kolesnikov, V.1    Schneider, T.2
  • 31
    • 84866714499 scopus 로고    scopus 로고
    • Towards billion-gate secure computation with malicious adversaries
    • Kreuter, B., Shelat, A., Shen, C.H.: Towards billion-gate secure computation with malicious adversaries. IACR Cryptology ePrint Archive 2012, 179 (2012)
    • (2012) IACR Cryptology ePrint Archive , vol.2012 , pp. 179
    • Kreuter, B.1    Shelat, A.2    Shen, C.H.3
  • 32
    • 52149120767 scopus 로고    scopus 로고
    • Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
    • Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. Springer, Heidelberg
    • Lindell, Y., Pinkas, B., Smart, N.P.: Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 2-20. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5229 , pp. 2-20
    • Lindell, Y.1    Pinkas, B.2    Smart, N.P.3
  • 33
    • 38049136534 scopus 로고    scopus 로고
    • An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
    • Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
    • Lindell, Y., Pinkas, B.: An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 52-78. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 52-78
    • Lindell, Y.1    Pinkas, B.2
  • 34
    • 64249101946 scopus 로고    scopus 로고
    • A proof of security of yao's protocol for two-party computation
    • Lindell, Y., Pinkas, B.: A proof of security of yao's protocol for two-party computation. J. Cryptology 22(2), 161-188 (2009)
    • (2009) J. Cryptology , vol.22 , Issue.2 , pp. 161-188
    • Lindell, Y.1    Pinkas, B.2
  • 35
    • 80054814127 scopus 로고    scopus 로고
    • Vmcrypt - Modular software architecture for scalable secure computation
    • Report 2010/584
    • Malka, L., Katz, J.: Vmcrypt - modular software architecture for scalable secure computation. Cryptology ePrint Archive, Report 2010/584 (2010), http://eprint.iacr.org/
    • (2010) Cryptology ePrint Archive
    • Malka, L.1    Katz, J.2
  • 37
    • 84947240143 scopus 로고    scopus 로고
    • Indistinguishability of Random Systems
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Maurer, U.M.: Indistinguishability of Random Systems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 110-132. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 110-132
    • Maurer, U.M.1
  • 38
    • 84957096920 scopus 로고    scopus 로고
    • Oblivious Transfer with Adaptive Queries
    • Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Naor, M., Pinkas, B.: Oblivious Transfer with Adaptive Queries. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 573-590. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 573-590
    • Naor, M.1    Pinkas, B.2
  • 40
    • 70350634167 scopus 로고    scopus 로고
    • LEGO for Two-Party Secure Computation
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Nielsen, J.B., Orlandi, C.: LEGO for Two-Party Secure Computation. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 368-386. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 368-386
    • Nielsen, J.B.1    Orlandi, C.2
  • 41
    • 72449131818 scopus 로고    scopus 로고
    • Secure Two-Party Computation Is Practical
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Pinkas, B., Schneider, T., Smart, N.P., Williams, S.C.: Secure Two-Party Computation Is Practical. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 250-267. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 250-267
    • Pinkas, B.1    Schneider, T.2    Smart, N.P.3    Williams, S.C.4
  • 43
    • 79958017670 scopus 로고    scopus 로고
    • Two-Output Secure Computation with Malicious Adversaries
    • Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
    • Shelat, A., Shen, C.-H.: Two-Output Secure Computation with Malicious Adversaries. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 386-405. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6632 , pp. 386-405
    • Shelat, A.1    Shen, C.-H.2
  • 44
    • 0020301290 scopus 로고
    • Theory and application of trapdoor functions
    • Yao, A.C.: Theory and application of trapdoor functions. In: Proc. 23rd FOCS, pp. 80-91 (1982)
    • (1982) Proc. 23rd FOCS , pp. 80-91
    • Yao, A.C.1
  • 45
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • Yao, A.C.: How to generate and exchange secrets. In: Proc. 27th FOCS, pp. 162-167 (1986)
    • (1986) Proc. 27th FOCS , pp. 162-167
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.