메뉴 건너뛰기




Volumn 13, Issue , 2011, Pages 6-24

A domain-specific language for computing on encrypted data

Author keywords

Domain Specific Language; Homomorphic Encryption; Secret Sharing

Indexed keywords

COMPUTATIONAL FEASIBILITY; CRYPTOGRAPHIC CLOUDS; DOMAIN SPECIFIC LANGUAGES; EXECUTION PLATFORMS; HO-MOMORPHIC ENCRYPTIONS; INFORMATION-THEORETIC SECURITY; SECRET SHARING; SECURE MULTI-PARTY COMPUTATION;

EID: 84880205249     PISSN: 18688969     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.4230/LIPIcs.FSTTCS.2011.6     Document Type: Conference Paper
Times cited : (9)

References (30)
  • 1
    • 77955319555 scopus 로고    scopus 로고
    • From secrecy to soundness: Efficient verification via secure computation
    • B. Applebaum, Y. Ishai, and E. Kushilevitz. From secrecy to soundness: Efficient verification via secure computation. In ICALP (1), pages 152-163, 2010.
    • (2010) ICALP (1) , pp. 152-163
    • Applebaum, B.1    Ishai, Y.2    Kushilevitz, E.3
  • 2
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract)
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In STOC, pages 1-10, 1988.
    • (1988) STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 3
    • 57049188348 scopus 로고    scopus 로고
    • Sharemind: A framework for fast privacy-preserving computations
    • D. Bogdanov, S. Laur, and J. Willemson. Sharemind: A framework for fast privacy-preserving computations. In ESORICS, pages 192-206, 2008.
    • (2008) ESORICS , pp. 192-206
    • Bogdanov, D.1    Laur, S.2    Willemson, J.3
  • 6
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-dnf formulas on ciphertexts
    • D. Boneh, E.-J. Goh, and K. Nissim. Evaluating 2-dnf formulas on ciphertexts. In TCC, pages 325-341, 2005.
    • (2005) TCC , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 7
    • 84948975649 scopus 로고    scopus 로고
    • General secure multi-party computation from any linear secret-sharing scheme
    • R. Cramer, I. Damgård, and U. M. Maurer. General secure multi-party computation from any linear secret-sharing scheme. In EUROCRYPT, pages 316-334, 2000.
    • (2000) EUROCRYPT , pp. 316-334
    • Cramer, R.1    Damgård, I.2    Maurer, U.M.3
  • 9
    • 77954633629 scopus 로고    scopus 로고
    • Perfectly secure multiparty computation and the computational overhead of cryptography
    • I. Damgård, Y. Ishai, and M. Krøigaard. Perfectly secure multiparty computation and the computational overhead of cryptography. In EUROCRYPT, pages 445-465, 2010.
    • (2010) EUROCRYPT , pp. 445-465
    • Damgård, I.1    Ishai, Y.2    Krøigaard, M.3
  • 10
    • 0031628398 scopus 로고    scopus 로고
    • Simplified vss and fact-track multiparty computations with applications to threshold cryptography
    • R. Gennaro, M. O. Rabin, and T. Rabin. Simplified vss and fact-track multiparty computations with applications to threshold cryptography. In PODC, pages 101-111, 1998.
    • (1998) PODC , pp. 101-111
    • Gennaro, R.1    Rabin, M.O.2    Rabin, T.3
  • 11
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC, pages 169-178, 2009.
    • (2009) STOC , pp. 169-178
    • Gentry, C.1
  • 12
    • 77649240581 scopus 로고    scopus 로고
    • Computing arbitrary functions of encrypted data
    • C. Gentry. Computing arbitrary functions of encrypted data. Commun. ACM, 53(3): 97-105, 2010.
    • (2010) Commun. ACM , vol.53 , Issue.3 , pp. 97-105
    • Gentry, C.1
  • 14
    • 79957974657 scopus 로고    scopus 로고
    • Implementing gentry's fully-homomorphic encryption scheme
    • C. Gentry and S. Halevi. Implementing gentry's fully-homomorphic encryption scheme. In EUROCRYPT, pages 129-148, 2011.
    • (2011) EUROCRYPT , pp. 129-148
    • Gentry, C.1    Halevi, S.2
  • 15
    • 77954628604 scopus 로고    scopus 로고
    • A simple bgn-type cryptosystem from lwe
    • C. Gentry, S. Halevi, and V. Vaikuntanathan. A simple bgn-type cryptosystem from lwe. In EUROCRYPT, pages 506-522, 2010.
    • (2010) EUROCRYPT , pp. 506-522
    • Gentry, C.1    Halevi, S.2    Vaikuntanathan, V.3
  • 16
    • 0023545076 scopus 로고
    • How to play any mental game or a completeness theorem for protocols with honest majority
    • O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In STOC, pages 218-229, 1987.
    • (1987) STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 18
    • 0034507841 scopus 로고    scopus 로고
    • Randomizing polynomials: A new representation with applications to round-efficient secure computation
    • Y. Ishai and E. Kushilevitz. Randomizing polynomials: A new representation with applications to round-efficient secure computation. In FOCS, pages 294-304, 2000.
    • (2000) FOCS , pp. 294-304
    • Ishai, Y.1    Kushilevitz, E.2
  • 19
    • 77956991013 scopus 로고    scopus 로고
    • Secure multiparty computation with minimal interaction
    • Y. Ishai, E. Kushilevitz, and A. Paskin. Secure multiparty computation with minimal interaction. In CRYPTO, pages 577-594, 2010.
    • (2010) CRYPTO , pp. 577-594
    • Ishai, Y.1    Kushilevitz, E.2    Paskin, A.3
  • 20
    • 38049046515 scopus 로고    scopus 로고
    • Evaluating branching programs on encrypted data
    • Y. Ishai and A. Paskin. Evaluating branching programs on encrypted data. In TCC, pages 575-594, 2007.
    • (2007) TCC , pp. 575-594
    • Ishai, Y.1    Paskin, A.2
  • 21
    • 64249101946 scopus 로고    scopus 로고
    • A proof of security of yao's protocol for two-party computation
    • Y. Lindell and B. Pinkas. A proof of security of yao's protocol for two-party computation. J. Cryptology, 22(2): 161-188, 2009.
    • (2009) J. Cryptology , vol.22 , Issue.2 , pp. 161-188
    • Lindell, Y.1    Pinkas, B.2
  • 23
    • 0034819509 scopus 로고    scopus 로고
    • Communication preserving protocols for secure function evaluation
    • M. Naor and K. Nissim. Communication preserving protocols for secure function evaluation. In STOC, pages 590-599, 2001.
    • (2001) STOC , pp. 590-599
    • Naor, M.1    Nissim, K.2
  • 24
    • 36448988910 scopus 로고    scopus 로고
    • A domain-specific programming language for secure multiparty computation
    • J. D. Nielsen and M. I. Schwartzbach. A domain-specific programming language for secure multiparty computation. In PLAS, pages 21-30, 2007.
    • (2007) PLAS , pp. 21-30
    • Nielsen, J.D.1    Schwartzbach, M.I.2
  • 25
    • 38049034355 scopus 로고    scopus 로고
    • Multiparty computation for interval, equality, and comparison without bit-decomposition protocol
    • T. Nishide and K. Ohta. Multiparty computation for interval, equality, and comparison without bit-decomposition protocol. In Public Key Cryptography, pages 343-360, 2007.
    • (2007) Public Key Cryptography , pp. 343-360
    • Nishide, T.1    Ohta, K.2
  • 28
    • 79955532534 scopus 로고    scopus 로고
    • Fully homomorphic encryption with relatively small key and ciphertext sizes
    • N. P. Smart and F. Vercauteren. Fully homomorphic encryption with relatively small key and ciphertext sizes. In Public Key Cryptography, pages 420-443, 2010.
    • (2010) Public Key Cryptography , pp. 420-443
    • Smart, N.P.1    Vercauteren, F.2
  • 30
    • 0020312165 scopus 로고
    • Protocols for secure computations (extended abstract)
    • A. Yao. Protocols for secure computations (extended abstract). In FOCS, pages 160-164, 1982.
    • (1982) FOCS , pp. 160-164
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.