메뉴 건너뛰기




Volumn , Issue , 2013, Pages 541-546

An efficient and probabilistic secure bit-decomposition

Author keywords

bit decomposition; encryption; security

Indexed keywords

BIT-DECOMPOSITION; COMPUTATION TIME; DOMAIN SIZE; HIGH PROBABILITY; HOMOMORPHIC ENCRYPTION SCHEMES; SECURE MULTI-PARTY COMPUTATION; SECURITY; SECURITY DEFINITIONS;

EID: 84877991754     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2484313.2484386     Document Type: Conference Paper
Times cited : (58)

References (18)
  • 1
    • 84937431456 scopus 로고    scopus 로고
    • Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
    • Springer-Verlag
    • J. Algesheimer, J. Camenisch, and V. Shoup. Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. In CRYPTO, pages 417-432. Springer-Verlag, 2002.
    • (2002) CRYPTO , pp. 417-432
    • Algesheimer, J.1    Camenisch, J.2    Shoup, V.3
  • 3
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty computation from threshold homomorphic encryption
    • Springer-Verlag
    • R. Cramer, I. Damgård, and J. B. Nielsen. Multiparty computation from threshold homomorphic encryption. In EUROCRYPT, pages 280-299. Springer-Verlag, 2001.
    • (2001) EUROCRYPT , pp. 280-299
    • Cramer, R.1    Damgård, I.2    Nielsen, J.B.3
  • 4
    • 33745567199 scopus 로고    scopus 로고
    • Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
    • Springer
    • I. Damgård, M. Fitzi, E. Kiltz, J. B. Nielsen, and T. Toft. Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In Theory of Cryptography Conference (TCC), volume 3876, pages 285-304. Springer, 2006.
    • (2006) Theory of Cryptography Conference (TCC) , vol.3876 , pp. 285-304
    • Damgård, I.1    Fitzi, M.2    Kiltz, E.3    Nielsen, J.B.4    Toft, T.5
  • 7
    • 77955339189 scopus 로고    scopus 로고
    • Modulo reduction for paillier encryptions and application to secure statistical analysis
    • Springer
    • J. Guajardo, B. Mennink, and B. Schoenmakers. Modulo reduction for paillier encryptions and application to secure statistical analysis. In Financial Cryptography and Data Security, volume 6052, pages 375-382. Springer, 2010.
    • (2010) Financial Cryptography and Data Security , vol.6052 , pp. 375-382
    • Guajardo, J.1    Mennink, B.2    Schoenmakers, B.3
  • 9
    • 82955177068 scopus 로고    scopus 로고
    • Constant-rounds, linear multi-party computation for exponentiation and modulo reduction with perfect security
    • ASIACRYPT, Springer
    • C. Ning and Q. Xu. Constant-rounds, linear multi-party computation for exponentiation and modulo reduction with perfect security. In ASIACRYPT, volume 7073 of LNCS, pages 572-589. Springer, 2011.
    • (2011) LNCS , vol.7073 , pp. 572-589
    • Ning, C.1    Xu, Q.2
  • 11
    • 38049034355 scopus 로고    scopus 로고
    • Multiparty computation for interval, equality, and comparison without bit-decomposition protocol
    • Springer-Verlag
    • T. Nishide and K. Ohta. Multiparty computation for interval, equality, and comparison without bit-decomposition protocol. In PKC, pages 343-360. Springer-Verlag, 2007.
    • (2007) PKC , pp. 343-360
    • Nishide, T.1    Ohta, K.2
  • 12
    • 84942550998 scopus 로고    scopus 로고
    • Public key cryptosystems based on composite degree residuosity classes
    • Springer-Verlag
    • P. Paillier. Public key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology - Eurocrypt '99, pages 223-238. Springer-Verlag, 1999.
    • (1999) Advances in Cryptology - Eurocrypt '99 , pp. 223-238
    • Paillier, P.1
  • 13
    • 77954596238 scopus 로고    scopus 로고
    • Linear, constant-rounds bit-decomposition
    • Springer-Verlag
    • T. Reistad and T. Toft. Linear, constant-rounds bit-decomposition. In ICISC, pages 245-257. Springer-Verlag, 2010.
    • (2010) ICISC , pp. 245-257
    • Reistad, T.1    Toft, T.2
  • 14
    • 33746092442 scopus 로고    scopus 로고
    • Efficient binary conversion for paillier encrypted values
    • Springer-Verlag
    • B. Schoenmakers and P. Tuyls. Efficient binary conversion for paillier encrypted values. In EUROCRYPT, pages 522-537. Springer-Verlag, 2006.
    • (2006) EUROCRYPT , pp. 522-537
    • Schoenmakers, B.1    Tuyls, P.2
  • 15
    • 0018545449 scopus 로고
    • How to share a secret
    • nov
    • A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, nov 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 17
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • Washington, DC, USA, IEEE Computer Society
    • A. C. Yao. Protocols for secure computations. In Symposium on Foundations of Computer Science, pages 160-164, Washington, DC, USA, 1982. IEEE Computer Society.
    • (1982) Symposium on Foundations of Computer Science , pp. 160-164
    • Yao, A.C.1
  • 18
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • IEEE Computer Society
    • A. C. Yao. How to generate and exchange secrets. In Symposium on Foundations of Computer Science, pages 162-167. IEEE Computer Society, 1986.
    • (1986) Symposium on Foundations of Computer Science , pp. 162-167
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.