메뉴 건너뛰기




Volumn 8754, Issue , 2013, Pages

Evaluating encrypted boolean functions on encrypted bits: Secure decision-making on the black side

Author keywords

Barrington's theorem; Confidential publish subscribe; Encrypted operations on encrypted data; Feige kilian naor protocol; Fixed structure group program; Secure cloud infrastructure; Secure decision making on black side

Indexed keywords

BARRINGTON'S THEOREM; CLOUD INFRASTRUCTURES; ENCRYPTED DATA; FIXED STRUCTURE; PUBLISH/SUBSCRIBE; SECURE DECISION-MAKING ON BLACK SIDE;

EID: 84881183582     PISSN: 0277786X     EISSN: 1996756X     Source Type: Conference Proceeding    
DOI: 10.1117/12.2018574     Document Type: Conference Paper
Times cited : (1)

References (17)
  • 1
    • 0009011118 scopus 로고
    • Bounded-width polynomial-size branching programs recognize exactly those languages in NC
    • Barrington, D. A. M., "Bounded-Width Polynomial-Size Branching Programs Recognize Exactly Those Languages in NC1, " STOC 1986.
    • (1986) STOC
    • Barrington, D.A.M.1
  • 2
    • 1842704832 scopus 로고    scopus 로고
    • Forwarding in a content-based network
    • Carzaniga, A. and Wolf, A. L., "Forwarding in a Content-Based Network, " ACM SIGCOMM, 2003.
    • (2003) ACM SIGCOMM
    • Carzaniga, A.1    Wolf, A.L.2
  • 3
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • Jun
    • Even, S., Goldreich, O. and Lempel, A., "A Randomized Protocol for Signing Contracts, " CACM, Jun 1985.
    • (1985) CACM
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 4
    • 0027986369 scopus 로고
    • A minimal model for secure computation
    • Feige, U., Kilian, J. and Naor, M., "A Minimal Model for Secure Computation, " STOC 1994.
    • (1994) STOC
    • Feige, U.1    Kilian, J.2    Naor, M.3
  • 5
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • Gentry, C., "Fully Homomorphic Encryption using Ideal Lattices, " STOC 2009.
    • (2009) STOC
    • Gentry, C.1
  • 7
    • 80755188493 scopus 로고    scopus 로고
    • From dust to dawn: Practically efficient two-party secure function evaluation protocols and their modular design
    • Kolesnikov, V., Sadeghi, A.-R. and Schneider, T., "From dust to dawn: Practically efficient two-party secure function evaluation protocols and their modular design, " Cryptology ePrint Archive, Report 2010/079, 2010.
    • (2010) Cryptology EPrint Archive, Report 2010/079
    • Kolesnikov, V.1    Sadeghi, A.-R.2    Schneider, T.3
  • 8
    • 79951660868 scopus 로고    scopus 로고
    • Policy-agile encrypted networks via secure function computation
    • Krishnan, R. and Sundaram, R., "Policy-agile Encrypted Networks Via Secure Function Computation, " MILCOM 2010.
    • (2010) MILCOM
    • Krishnan, R.1    Sundaram, R.2
  • 9
    • 1342297764 scopus 로고    scopus 로고
    • Oblivious transfer with adaptive queries
    • Naor, M., Pinkas, B., "Oblivious transfer with adaptive queries, " CRYPTO 1999.
    • (1999) CRYPTO
    • Naor, M.1    Pinkas, B.2
  • 10
    • 84881145650 scopus 로고
    • Section 15.3: The class NC
    • (1st ed.), Addison Wesley, ISBN 0-201-53082-1
    • Papadimitriou, C., "Section 15.3: The class NC, " Computational Complexity (1st ed.), Addison Wesley, pp. 375- 381, ISBN 0-201-53082-1, 1993.
    • (1993) Computational Complexity , pp. 375-381
    • Papadimitriou, C.1
  • 12
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Rabin, M. O., "How to exchange secrets by oblivious transfer, " Tech Report TR-81, Harvard U., 1981.
    • (1981) Tech Report TR-81, Harvard U
    • Rabin, M.O.1
  • 13
    • 50049089599 scopus 로고    scopus 로고
    • Enabling confidentiality in content-based publish/subscribe infrastructures
    • Raiciu C., and Rosenblum, D. S., "Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures, " SecureComm 2006.
    • (2006) SecureComm
    • Raiciu, C.1    Rosenblum, D.S.2
  • 16
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • Yao, A. C., "Protocols for secure computations, " FOCS 1982.
    • (1982) FOCS
    • Yao, A.C.1
  • 17
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • Yao, A.C., "How to Generate and Exchange Secrets, " FOCS 1986.
    • (1986) FOCS
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.