메뉴 건너뛰기




Volumn 0, Issue 9783642143120, 2010, Pages 367-386

Efficient secure two-party computation with untrusted hardware tokens (full version)

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; FUNCTION EVALUATION;

EID: 84876237965     PISSN: 16197100     EISSN: 2197845X     Source Type: Book Series    
DOI: 10.1007/978-3-642-14452-3_17     Document Type: Chapter
Times cited : (4)

References (36)
  • 1
    • 84945134014 scopus 로고    scopus 로고
    • Priced oblivious transfer: How to sell digital goods
    • Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York, NY
    • W. Aiello, Y. Ishai, O. Reingold, Priced oblivious transfer: How to sell digital goods. In Advances in Cryptology - EUROCRYPT’01. Lecture Notes in Computer Science, vol. 2045 (Springer-Verlag, Berlin, Heidelberg, New York, NY, 2001), pp. 119-135
    • (2001) Advances in Cryptology - EUROCRYPT’01 , vol.2045 , pp. 119-135
    • Aiello, W.1    Ishai, Y.2    Reingold, O.3
  • 3
    • 0026206365 scopus 로고
    • Circuit width, register allocation, and ordered binary decision diagrams
    • C.L. Berman, Circuit width, register allocation, and ordered binary decision diagrams. IEEE Trans. CAD 10(8), 1059-1066 (1991)
    • (1991) IEEE Trans. CAD , vol.10 , Issue.8 , pp. 1059-1066
    • Berman, C.L.1
  • 5
    • 27244440344 scopus 로고    scopus 로고
    • In A Very Compact S-box for AES
    • Edinburgh, UK, 29 Aug-1 Sept 2005. Lecture Notes in Computer Science, Springer
    • D. Canright, in A Very Compact S-box for AES. Cryptographic Hardware and Embedded Systems (CHES’05), Edinburgh, UK, 29 Aug-1 Sept 2005. Lecture Notes in Computer Science, vol. 3659 (Springer, 2005), pp. 441-456
    • (2005) Cryptographic Hardware and Embedded Systems (CHES’05) , vol.3659 , pp. 441-456
    • Canright, D.1
  • 7
    • 44449151536 scopus 로고    scopus 로고
    • New constructions for UC secure computation using tamperpro of hardware
    • Istanbul, Turkey, 13-17, Lecture Notes in Computer Science, Springer
    • N. Chandran, V. Goyal, A. Sahai, New constructions for UC secure computation using tamperpro of hardware. in Advances in Cryptology - EUROCRYPT’08, Istanbul, Turkey, 13-17 Apr 2008. Lecture Notes in Computer Science, vol. 4965 (Springer, 2008), pp. 545-562
    • (2008) In Advances in Cryptology - EUROCRYPT’08 , vol.4965 , pp. 545-562
    • Chandran, N.1    Goyal, V.2    Sahai, A.3
  • 8
    • 70350625407 scopus 로고    scopus 로고
    • In Universally Composable Multiparty Computation with Partially Isolated Parties
    • San Francisco, CA, USA, 15-17 Mar 2009. Lecture Notes in Computer Science, Springer
    • I. Damgård, J.B. Nielsen, D. Wichs, in Universally Composable Multiparty Computation with Partially Isolated Parties. Theory of Cryptography (TCC’09), San Francisco, CA, USA, 15-17 Mar 2009. Lecture Notes in Computer Science vol. 5444 (Springer, 2009), pp. 315-331
    • (2009) Theory of Cryptography (TCC’09) , vol.5444 , pp. 315-331
    • Damgård, I.1    Nielsen, J.B.2    Wichs, D.3
  • 9
    • 34548814766 scopus 로고    scopus 로고
    • In Strong Crypto for RFID Tags - A Comparison of Low-Power Hardware Implementations
    • IEEE Computer Society
    • M. Feldhofer, J. Wolkerstorfer, in Strong Crypto for RFID Tags - A Comparison of Low-Power Hardware Implementations. International Symposium on Circuits and Systems (ISCAS’07) (IEEE Computer Society, 2007), pp. 1839-1842
    • (2007) International Symposium on Circuits and Systems (ISCAS’07) , pp. 1839-1842
    • Feldhofer, M.1    Wolkerstorfer, J.2
  • 10
    • 33750232983 scopus 로고    scopus 로고
    • Trustedpals: Secure Multiparty Computation Implemented with Smart Cards
    • Hamburg, Germany, 18-20 Sept 2006. Lecture Notes in Computer Science
    • M. Fort, F.C. Freiling, L.D. Penso, Z. Benenson, D. Kesdogan, in Trustedpals: Secure Multiparty Computation Implemented with Smart Cards. European Symposium on Research in Computer Security (ESORICS’06), Hamburg, Germany, 18-20 Sept 2006. Lecture Notes in Computer Science, vol. 4189 (Springer, 2006), pp. 34-48
    • (2006) European Symposium on Research in Computer Security (ESORICS’06) , vol.4189 , pp. 34-48
    • Fort, M.1    Freiling, F.C.2    Penso, L.D.3    Benenson, Z.4    Kesdogan, D.5
  • 11
    • 70350381719 scopus 로고    scopus 로고
    • Google Health (2009). https://www.google.com/health
    • (2009) Google Health
  • 12
    • 44449160882 scopus 로고    scopus 로고
    • Efficient two party and multi party computation against covert adversaries
    • Istanbul, Turkey, 13-17 Apr 2008. Lecture Notes in Computer Science, Springer
    • V. Goyal, P. Mohassel, A. Smith, Efficient two party and multi party computation against covert adversaries. in Advances in Cryptology - EUROCRYPT’08, Istanbul, Turkey, 13-17 Apr 2008. Lecture Notes in Computer Science, vol. 4965 (Springer, 2008), pp. 289-306
    • (2008) in Advances in Cryptology - EUROCRYPT’08 , vol.4965 , pp. 289-306
    • Goyal, V.1    Mohassel, P.2    Smith, A.3
  • 13
    • 54249137843 scopus 로고    scopus 로고
    • In Generalized Non-interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
    • Cozumel, Mexico, 28-31 Jan 2008. Lecture Notes in Computer Science
    • V. Gunupudi, S. Tate, in Generalized Non-interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents. Financial Cryptography and Data Security (FC’08), Cozumel, Mexico, 28-31 Jan 2008. Lecture Notes in Computer Science, vol. 5143 (Springer, 2008), pp. 98-112
    • (2008) Financial Cryptography and Data Security (FC’08) , vol.5143 , pp. 98-112
    • Gunupudi, V.1    Tate, S.2
  • 16
    • 33750228085 scopus 로고    scopus 로고
    • More Efficient Secure Function Evaluation Using Tiny Trusted Third Parties
    • Hanover, NH, URL
    • A. Iliev, S. Smith, More Efficient Secure Function Evaluation Using Tiny Trusted Third Parties. Technical Report TR2005-551, Dartmouth College, Computer Science, Hanover, NH (2005). URL http://www.cs.dartmouth.edu/reports/TR2005-551.pdf
    • (2005) Technical Report TR2005-551, Dartmouth College, Computer Science
    • Iliev, A.1    Smith, S.2
  • 17
    • 24144457853 scopus 로고    scopus 로고
    • Extending oblivious transfers efficiently
    • Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York, NY
    • Y. Ishai, J. Kilian, K. Nissim, E. Petrank, Extending oblivious transfers efficiently. in Advances in Cryptology - CRYPTO’03. Lecture Notes in Computer Science, vol. 2729 (Springer-Verlag, Berlin, Heidelberg, New York, NY 2003) pp. 145-161
    • (2003) Advances in Cryptology - CRYPTO’03 , vol.2729 , pp. 145-161
    • Ishai, Y.1    Kilian, J.2    Nissim, K.3    Petrank, E.4
  • 19
    • 38049150653 scopus 로고    scopus 로고
    • Universally composable multi-party computation using tamper-proof hardware
    • Barcelona, Spain, 20-24 May 2007. Lecture Notes in Computer Science, Springer
    • J. Katz, Universally composable multi-party computation using tamper-proof hardware. In Advances in Cryptology - EUROCRYPT’07, Barcelona, Spain, 20-24 May 2007. Lecture Notes in Computer Science, vol. 4515 (Springer, 2007), pp. 115-128
    • (2007) Advances in Cryptology - EUROCRYPT’07 , vol.4515 , pp. 115-128
    • Katz, J.1
  • 20
    • 49049099825 scopus 로고    scopus 로고
    • In Improved Garbled Circuit: Free XOR Gates and Applications
    • Reykjavik, Iceland, 6-13 July 2008. Lecture Notes in Computer Science, Springer
    • V. Kolesnikov, T. Schneider, in Improved Garbled Circuit: Free XOR Gates and Applications. International Colloquium on Automata, Languages and Programming (ICALP’08), Reykjavik, Iceland, 6-13 July 2008. Lecture Notes in Computer Science, vol. 5126 (Springer, 2008), pp. 486-498
    • (2008) International Colloquium on Automata, Languages and Programming (ICALP’08) , vol.5126 , pp. 486-498
    • Kolesnikov, V.1    Schneider, T.2
  • 22
    • 38049136534 scopus 로고    scopus 로고
    • An efficient protocol for secure two-party computation in the presence of malicious adversaries
    • Spain, 20-24, Lecture Notes in Computer Science, (Springer, 2007)
    • Y. Lindell, B. Pinkas, An efficient protocol for secure two-party computation in the presence of malicious adversaries. in Advances in Cryptology - EUROCRYPT’07 Barcelona, Spain, 20-24 May 2007. Lecture Notes in Computer Science, vol. 4515 (Springer, 2007), pp. 52-78
    • (2007) Advances in Cryptology - EUROCRYPT’07 Barcelona , vol.4515 , pp. 52-78
    • Lindell, Y.1    Pinkas, B.2
  • 23
    • 64249101946 scopus 로고    scopus 로고
    • A proof of Yao’s protocol for secure two-party computation
    • Cryptology ePrint Archive, Report 2004/175
    • Y. Lindell, B. Pinkas, A proof of Yao’s protocol for secure two-party computation. J. Cryptol. 22(2), 161-188 (2009). Cryptology ePrint Archive, Report 2004/175, http://eprint.iacr.org
    • (2009) J. Cryptol , vol.22 , Issue.2 , pp. 161-188
    • Lindell, Y.1    Pinkas, B.2
  • 24
    • 52149120767 scopus 로고    scopus 로고
    • In Implementing Two-party Computation Efficiently with Security Against Malicious Adversaries
    • Amalfi, Italy, 10-12, Lecture Notes in Computer Science, (Springer, 2008)
    • Y. Lindell, B. Pinkas, N. Smart, in Implementing Two-party Computation Efficiently with Security Against Malicious Adversaries. Security and Cryptography for Networks (SCN’08), Amalfi, Italy, 10-12 Sept 2008. Lecture Notes in Computer Science, vol. 5229 (Springer, 2008), pp. 2-20
    • (2008) Security and Cryptography for Networks (SCN’08 , vol.5229 , pp. 2-20
    • Lindell, Y.1    Pinkas, B.2    Smart, N.3
  • 25
    • 85084163840 scopus 로고    scopus 로고
    • Fairplay -A Secure Two-party Computation System
    • San Diego, CA, USA, 9-13 Aug 2004, USENIX Association
    • D. Malkhi, N. Nisan, B. Pinkas, Y. Sella, in Fairplay -A Secure Two-party Computation System. USENIX Security Symposium (Security’04), San Diego, CA, USA, 9-13 Aug 2004 (USENIX Association, 2004)
    • (2004) USENIX Security Symposium (Security’04)
    • Malkhi, D.1    Nisan, N.2    Pinkas, B.3    Sella, Y.4
  • 26
    • 44449101614 scopus 로고    scopus 로고
    • David and goliath commitments: UC computation for asymmetric parties using tamper-proof hardware
    • Istanbul, Turkey, 13-17 Apr 2008. Lecture Notes in Computer Science, Springer
    • T. Moran, G. Segev, David and goliath commitments: UC computation for asymmetric parties using tamper-proof hardware. in Advances in Cryptology - EUROCRYPT’08, Istanbul, Turkey, 13-17 Apr 2008. Lecture Notes in Computer Science, vol. 4965 (Springer, 2008), pp. 527-544
    • (2008) Advances in Cryptology - EUROCRYPT’08 , vol.4965 , pp. 527-544
    • Moran, T.1    Segev, G.2
  • 27
    • 64049119146 scopus 로고    scopus 로고
    • In Efficient Oblivious Transfer Protocols
    • Washington, DC, USA, 7-9, (Society for Industrial and Applied Mathematics, 2001)
    • M. Naor, B. Pinkas, in Efficient Oblivious Transfer Protocols. ACM-SIAM Symposium On Discrete Algorithms (SODA’01), Washington, DC, USA, 7-9 Jan 2001. (Society for Industrial and Applied Mathematics, 2001), pp. 448-457
    • (2001) ACM-SIAM Symposium on Discrete Algorithms (SODA’01) , pp. 448-457
    • Naor, M.1    Pinkas, B.2
  • 28
    • 33645492588 scopus 로고    scopus 로고
    • Advanced Encryption Standard (AES)
    • NIST, U.S. National Institute of Standards and Technology: Federal information processing standards (FIPS 197). Advanced Encryption Standard (AES) (2001). http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
    • (2001) Federal Information Processing Standards (FIPS 197)
  • 29
    • 85019718769 scopus 로고    scopus 로고
    • Federal information processing standards (FIPS 180-2)
    • NIST, U.S. National Institute of Standards and Technology: Federal information processing standards (FIPS 180-2). Announcing the Secure Hash Standard (2002). http://csrc.nist.gov/publications/fips/fips180-2/fips-180-2.pdf
    • (2002) Announcing the Secure Hash Standard
  • 30
    • 72449131818 scopus 로고    scopus 로고
    • Secure two-party computation is practical. In Advances in Cryptology - ASIACRYPT 2009, Tokyo, Japan, 6-10
    • (Springer, 2009)
    • B. Pinkas, T. Schneider, N.P. Smart, S.C. Williams, Secure two-party computation is practical. in Advances in Cryptology - ASIACRYPT 2009, Tokyo, Japan, 6-10 Dec 2009. Lecture Notes in Computer Science, vol. 5912 (Springer, 2009), pp. 250-267
    • (2009) Lecture Notes in Computer Science , vol.5912 , pp. 250-267
    • Pinkas, B.1    Schneider, T.2    Smart, N.P.3    Williams, S.C.4
  • 31
    • 84938487169 scopus 로고
    • The synthesis of two-terminal switching circuits
    • C.E. Shannon, The synthesis of two-terminal switching circuits. Bell Syst. Tech. J. 28(1), 59-98 (1949)
    • (1949) Bell Syst. Tech. J , vol.28 , Issue.1 , pp. 59-98
    • Shannon, C.E.1
  • 34
    • 70350754104 scopus 로고    scopus 로고
    • In Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology
    • Concordia University, Montreal, Canada, 12-15, Lecture Notes in Computer Science, (Springer, 2009)
    • S. Tate, R. Vishwanathan, in Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology. Data and Applications Security (DBSec’09), Concordia University, Montreal, Canada, 12-15 July 2009. Lecture Notes in Computer Science, vol. 5645 (Springer, 2009), pp. 252-267
    • (2009) Data and Applications Security (DBSec’09) , vol.5645 , pp. 252-267
    • Tate, S.1    Vishwanathan, R.2
  • 35
    • 0030087056 scopus 로고    scopus 로고
    • Extending Quine-McCluskey for exclusive-or logic synthesis
    • B.C.H. Turton, Extending Quine-McCluskey for exclusive-or logic synthesis. IEEE Trans. Educ. 39, 81-85 (1996)
    • (1996) IEEE Trans. Educ , vol.39 , pp. 81-85
    • Turton, B.C.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.