메뉴 건너뛰기




Volumn , Issue , 2012, Pages 272-284

Quid-pro-quo-tocols: Strengthening semi-honest protocols with dual execution

Author keywords

privacy preserving protocols; secure two party computation

Indexed keywords

CONCRETE DESIGN; DESIGN AND IMPLEMENTATIONS; EQUALITY TESTS; GARBLED CIRCUITS; LEARN+; MALICIOUS ADVERSARIES; MALICIOUS BEHAVIOR; PRIVACY-PRESERVING PROTOCOLS; SECURE TWO-PARTY COMPUTATIONS; SEMI-HONEST ADVERSARIES;

EID: 84878348015     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2012.43     Document Type: Conference Paper
Times cited : (70)

References (36)
  • 1
    • 73849126104 scopus 로고    scopus 로고
    • Security against covert adversaries: Efficient protocols for realistic adversaries
    • Y. Aumann and Y. Lindell. Security against covert adversaries: Efficient protocols for realistic adversaries. Journal of Cryptology, 23(2):281-343, 2010.
    • (2010) Journal of Cryptology , vol.23 , Issue.2 , pp. 281-343
    • Aumann, Y.1    Lindell, Y.2
  • 4
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143-202, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 5
    • 68949136946 scopus 로고    scopus 로고
    • Efficient robust private set intersection
    • 7th Intl. Conference on Applied Cryptography and Network Security (ACNS), Springer
    • D. Dachman-Soled, T. Malkin, M. Raykova, and M. Yung. Efficient robust private set intersection. In 7th Intl. Conference on Applied Cryptography and Network Security (ACNS), volume 5536 of LNCS, pages 125-142. Springer, 2009.
    • (2009) LNCS , vol.5536 , pp. 125-142
    • Dachman-Soled, D.1    Malkin, T.2    Raykova, M.3    Yung, M.4
  • 6
    • 0029362450 scopus 로고
    • Practical and provably secure release of a secret and exchange of signatures
    • I. Damgård. Practical and provably secure release of a secret and exchange of signatures. Journal of Cryptology, 8(4):201-222, 1995.
    • (1995) Journal of Cryptology , vol.8 , Issue.4 , pp. 201-222
    • Damgård, I.1
  • 7
    • 78650834525 scopus 로고    scopus 로고
    • Linear-complexity private set intersection protocols secure in malicious model
    • Advances in Cryptology - Asiacrypt 2010, Springer
    • E. De Cristofaro, J. Kim, and G. Tsudik. Linear-complexity private set intersection protocols secure in malicious model. In Advances in Cryptology - Asiacrypt 2010, volume 6477 of LNCS, pages 213-231. Springer, 2010.
    • (2010) LNCS , vol.6477 , pp. 213-231
    • De Cristofaro, E.1    Kim, J.2    Tsudik, G.3
  • 8
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 9
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Advances in Cryptology - Eurocrypt 2004, Springer
    • M. J. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In Advances in Cryptology - Eurocrypt 2004, volume 3027 of LNCS, pages 1-19. Springer, 2004.
    • (2004) LNCS , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 10
    • 78649820323 scopus 로고    scopus 로고
    • Basic Applications
    • Cambridge University Press, Cambridge, UK
    • O. Goldreich. Foundations of Cryptography, vol. 2: Basic Applications. Cambridge University Press, Cambridge, UK, 2004.
    • (2004) Foundations of Cryptography , vol.2
    • Goldreich, O.1
  • 12
    • 40249091385 scopus 로고    scopus 로고
    • OT-combiners via secure computation
    • 5th Theory of Cryptography Conference - TCC 2008, Springer
    • D. Harnik, Y. Ishai, E. Kushilevitz, and J. B. Nielsen. OT-combiners via secure computation. In 5th Theory of Cryptography Conference - TCC 2008, volume 4948 of LNCS, pages 393-411. Springer, 2008.
    • (2008) LNCS , vol.4948 , pp. 393-411
    • Harnik, D.1    Ishai, Y.2    Kushilevitz, E.3    Nielsen, J.B.4
  • 13
    • 40249108370 scopus 로고    scopus 로고
    • Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
    • 5th Theory of Cryptography Conference - TCC 2008, Springer
    • C. Hazay and Y. Lindell. Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In 5th Theory of Cryptography Conference - TCC 2008, volume 4948 of LNCS, pages 155-175. Springer, 2008.
    • (2008) LNCS , vol.4948 , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 18
    • 85028775577 scopus 로고
    • Direct minimum-knowledge computations
    • Advances in Cryptology - Crypto '87, Springer
    • R. Impagliazzo and M. Yung. Direct minimum-knowledge computations. In Advances in Cryptology - Crypto '87, volume 293 of LNCS, pages 40-51. Springer, 1988.
    • (1988) LNCS , vol.293 , pp. 40-51
    • Impagliazzo, R.1    Yung, M.2
  • 20
    • 70350656283 scopus 로고    scopus 로고
    • Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection
    • 6th Theory of Cryptography Conference - TCC 2009, Springer
    • S. Jarecki and X. Liu. Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection. In 6th Theory of Cryptography Conference - TCC 2009, volume 5444 of LNCS, pages 577-594. Springer, 2009.
    • (2009) LNCS , vol.5444 , pp. 577-594
    • Jarecki, S.1    Liu, X.2
  • 21
    • 77958056561 scopus 로고    scopus 로고
    • Fast secure computation of set intersection
    • 7th Intl. Conf. on Security and Cryptography for Networks, Springer
    • S. Jarecki and X. Liu. Fast secure computation of set intersection. In 7th Intl. Conf. on Security and Cryptography for Networks, volume 6280 of LNCS, pages 418-435. Springer, 2010.
    • (2010) LNCS , vol.6280 , pp. 418-435
    • Jarecki, S.1    Liu, X.2
  • 22
    • 38049136533 scopus 로고    scopus 로고
    • Efficient two-party secure computation on committed inputs
    • Advances in Cryptology - Eurocrypt 2007, Springer
    • S. Jarecki and V. Shmatikov. Efficient two-party secure computation on committed inputs. In Advances in Cryptology - Eurocrypt 2007, volume 4515 of LNCS, pages 97-114. Springer, 2007.
    • (2007) LNCS , vol.4515 , pp. 97-114
    • Jarecki, S.1    Shmatikov, V.2
  • 23
    • 49049099825 scopus 로고    scopus 로고
    • Improved garbled circuit: Free XOR gates and applications
    • 35th Intl. Colloquium on Automata, Languages, and Programming (ICALP), Part II, Springer
    • V. Kolesnikov and T. Schneider. Improved garbled circuit: Free XOR gates and applications. In 35th Intl. Colloquium on Automata, Languages, and Programming (ICALP), Part II, volume 5126 of LNCS, pages 486-498. Springer, 2008.
    • (2008) LNCS , vol.5126 , pp. 486-498
    • Kolesnikov, V.1    Schneider, T.2
  • 24
    • 80052009576 scopus 로고    scopus 로고
    • The IPS compiler: Optimizations, variants and concrete efficiency
    • Advances in Cryptology - Crypto 2011, Springer
    • Y. Lindell, E. Oxman, and B. Pinkas. The IPS compiler: Optimizations, variants and concrete efficiency. In Advances in Cryptology - Crypto 2011, volume 6841 of LNCS, pages 259-276. Springer, 2011.
    • (2011) LNCS , vol.6841 , pp. 259-276
    • Lindell, Y.1    Oxman, E.2    Pinkas, B.3
  • 25
    • 38049136534 scopus 로고    scopus 로고
    • An efficient protocol for secure two-party computation in the presence of malicious adversaries
    • Advances in Cryptology - Eurocrypt 2007, Springer
    • Y. Lindell and B. Pinkas. An efficient protocol for secure two-party computation in the presence of malicious adversaries. In Advances in Cryptology - Eurocrypt 2007, volume 4515 of LNCS, pages 52-78. Springer, 2007.
    • (2007) LNCS , vol.4515 , pp. 52-78
    • Lindell, Y.1    Pinkas, B.2
  • 26
    • 64249101946 scopus 로고    scopus 로고
    • A proof of security of Yao's protocol for two-party computation
    • Y. Lindell and B. Pinkas. A proof of security of Yao's protocol for two-party computation. Journal of Cryptology, 22(2):161-188, 2009.
    • (2009) Journal of Cryptology , vol.22 , Issue.2 , pp. 161-188
    • Lindell, Y.1    Pinkas, B.2
  • 27
    • 79953241261 scopus 로고    scopus 로고
    • Secure two-party computation via cut-and-choose oblivious transfer
    • 8th Theory of Cryptography Conference - TCC 2011, Springer
    • Y. Lindell and B. Pinkas. Secure two-party computation via cut-and-choose oblivious transfer. In 8th Theory of Cryptography Conference - TCC 2011, volume 6597 of LNCS, pages 329-346. Springer, 2011.
    • (2011) LNCS , vol.6597 , pp. 329-346
    • Lindell, Y.1    Pinkas, B.2
  • 28
    • 52149120767 scopus 로고    scopus 로고
    • Implementing two-party computation efficiently with security against malicious adversaries
    • 6th Intl. Conf. on Security and Cryptography for Networks (SCN '08), Springer
    • Y. Lindell, B. Pinkas, and N. Smart. Implementing two-party computation efficiently with security against malicious adversaries. In 6th Intl. Conf. on Security and Cryptography for Networks (SCN '08), volume 5229 of LNCS, pages 2-20. Springer, 2008.
    • (2008) LNCS , vol.5229 , pp. 2-20
    • Lindell, Y.1    Pinkas, B.2    Smart, N.3
  • 30
    • 33745843587 scopus 로고    scopus 로고
    • Efficiency tradeoffs for malicious two-party computation
    • 9th Intl. Conference on Theory and Practice of Public Key Cryptography(PKC 2006), Springer
    • P. Mohassel and M. Franklin. Efficiency tradeoffs for malicious two-party computation. In 9th Intl. Conference on Theory and Practice of Public Key Cryptography(PKC 2006), volume 3958 of LNCS, pages 458-473. Springer, 2006.
    • (2006) LNCS , vol.3958 , pp. 458-473
    • Mohassel, P.1    Franklin, M.2
  • 33
    • 70350634167 scopus 로고    scopus 로고
    • LEGO for two-party secure computation
    • 6th Theory of Cryptography Conference - TCC 2009, Springer
    • J. B. Nielsen and C. Orlandi. LEGO for two-party secure computation. In 6th Theory of Cryptography Conference - TCC 2009, volume 5444 of LNCS, pages 368-386. Springer, 2009.
    • (2009) LNCS , vol.5444 , pp. 368-386
    • Nielsen, J.B.1    Orlandi, C.2
  • 34
    • 72449131818 scopus 로고    scopus 로고
    • Secure two-party computation is practical
    • Advances in Cryptology - Asiacrypt 2009, Springer
    • B. Pinkas, T. Schneider, N. Smart, and S. Williams. Secure two-party computation is practical. In Advances in Cryptology - Asiacrypt 2009, volume 5912 of LNCS, pages 250-267. Springer, 2009.
    • (2009) LNCS , vol.5912 , pp. 250-267
    • Pinkas, B.1    Schneider, T.2    Smart, N.3    Williams, S.4
  • 35
    • 79958017670 scopus 로고    scopus 로고
    • Two-output secure computation with malicious adversaries
    • Advances in Cryptology - Eurocrypt 2011, Springer
    • A. Shelat and C.-H. Shen. Two-output secure computation with malicious adversaries. In Advances in Cryptology - Eurocrypt 2011, volume 6632 of LNCS, pages 386-405. Springer, 2011.
    • (2011) LNCS , vol.6632 , pp. 386-405
    • Shelat, A.1    Shen, C.-H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.