메뉴 건너뛰기




Volumn , Issue , 2012, Pages 285-300

Billion-gate secure computation with malicious adversaries

Author keywords

[No Author keywords available]

Indexed keywords

COMMON REFERENCE STRING; GATE CIRCUIT; MALICIOUS ADVERSARIES; PARALLELIZING; RANDOM ORACLE MODEL; SECURE COMPUTATION; THE STANDARD MODEL;

EID: 84889076745     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (178)

References (33)
  • 3
    • 77954990110 scopus 로고    scopus 로고
    • A new combinational logic minimization technique with applications to cryptology
    • Berlin, Heidelberg, SEA’10, Springer-Verlag
    • BOYAR, J., AND PERALTA, R. A new combinational logic minimization technique with applications to cryptology. In Proceedings of the 9th international conference on Experimental Algorithms (Berlin, Heidelberg, 2010), SEA’10, Springer-Verlag, pp. 178–189.
    • (2010) Proceedings of the 9th International Conference on Experimental Algorithms , pp. 178-189
    • Boyar, J.1    Peralta, R.2
  • 13
    • 84914127581 scopus 로고    scopus 로고
    • Faster secure two-party computation using garbled circuits
    • Berkeley, CA, USA, SEC’11, USENIX Association
    • HUANG, Y., EVANS, D., KATZ, J., AND MALKA, L. Faster secure two-party computation using garbled circuits. In Proceedings of the 20th USENIX conference on Security (Berkeley, CA, USA, 2011), SEC’11, USENIX Association, pp. 35–35.
    • (2011) Proceedings of the 20th USENIX Conference on Security , pp. 35
    • Huang, Y.1    Evans, D.2    Katz, J.3    Malka, L.4
  • 14
    • 84899756503 scopus 로고    scopus 로고
    • Efficient privacy-preserving biometric identification
    • HUANG, Y., MALKA, L., EVANS, D., AND KATZ, J. Efficient Privacy-Preserving Biometric Identification. In NDSS’11 (2011).
    • (2011) NDSS’11
    • Huang, Y.1    Malka, L.2    Evans, D.3    Katz, J.4
  • 15
    • 24144457853 scopus 로고    scopus 로고
    • Extending oblivious transfers efficiently
    • of LNCS. Springer Berlin / Heidelberg
    • ISHAI, Y., KILIAN, J., NISSIM, K., AND PETRANK, E. Extending Oblivious Transfers Efficiently. In CRYPTO’03, vol. 2729 of LNCS. Springer Berlin / Heidelberg, 2003, pp. 145–161.
    • (2003) CRYPTO’03 , vol.2729 , pp. 145-161
    • Ishai, Y.1    Kilian, J.2    Nissim, K.3    Petrank, E.4
  • 17
  • 21
    • 80052009576 scopus 로고    scopus 로고
    • The IPS compiler: Optimizations, variants and concrete efficiency
    • LINDELL, Y., OXMAN, E., AND PINKAS, B. The IPS Compiler: Optimizations, Variants and Concrete Efficiency. In CRYPTO’11 (2011), pp. 259–276.
    • (2011) CRYPTO’11 , pp. 259-276
    • Lindell, Y.1    Oxman, E.2    Pinkas, B.3
  • 23
    • 38049136534 scopus 로고    scopus 로고
    • An efficient protocol for secure two-party computation in the presence of malicious adversaries
    • Berlin, Heidelberg, EUROCRYPT’07, Springer-Verlag
    • LINDELL, Y., AND PINKAS, B. An efficient protocol for secure two-party computation in the presence of malicious adversaries. In Proceedings of the 26th annual international conference on Advances in Cryptology (Berlin, Heidelberg, 2007), EUROCRYPT’07, Springer-Verlag, pp. 52–78.
    • (2007) Proceedings of the 26th Annual International Conference on Advances in Cryptology , pp. 52-78
    • Lindell, Y.1    Pinkas, B.2
  • 24
    • 79953241261 scopus 로고    scopus 로고
    • Secure two-party computation via cut-and-choose oblivious transfer
    • Berlin, Heidelberg, TCC’11, Springer-Verlag
    • LINDELL, Y., AND PINKAS, B. Secure two-party computation via cut-and-choose oblivious transfer. In Proceedings of the 8th conference on Theory of cryptography (Berlin, Heidelberg, 2011), TCC’11, Springer-Verlag, pp. 329–346.
    • (2011) Proceedings of the 8th Conference on Theory of Cryptography , pp. 329-346
    • Lindell, Y.1    Pinkas, B.2
  • 26
    • 80755168310 scopus 로고    scopus 로고
    • VMcrypt: Modular software architecture for scalable secure computation
    • New York, NY, USA, CCS’11, ACM
    • MALKA, L. Vmcrypt: modular software architecture for scalable secure computation. In Proceedings of the 18th ACM conference on Computer and communications security (New York, NY, USA, 2011), CCS’11, ACM, pp. 715–724.
    • (2011) Proceedings of the 18th ACM Conference on Computer and Communications Security , pp. 715-724
    • Malka, L.1
  • 31
    • 85076212832 scopus 로고    scopus 로고
    • RELIC. http://code.google.com/p/relic-toolkit/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.