메뉴 건너뛰기




Volumn , Issue , 2013, Pages 3-14

Knowledge inference for optimizing secure multi-party computation

Author keywords

Information flow; Program verification; Secure multi party computation

Indexed keywords

SECURITY OF DATA;

EID: 84890726242     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2465106.2465117     Document Type: Conference Paper
Times cited : (17)

References (24)
  • 2
    • 84880084787 scopus 로고    scopus 로고
    • research.microsoft.com/en-us/um/redmond/projects/z3
    • Z3 theorem prover. research.microsoft.com/en-us/um/redmond/projects/z3.
    • Z3 Theorem Prover
  • 3
    • 24144449674 scopus 로고    scopus 로고
    • Secure computation of the k th-ranked element
    • Springer
    • G. Aggarwal, N. Mishra, and B. Pinkas. Secure computation of the k th-ranked element. In EUROCRYPT. Springer, 2004.
    • (2004) EUROCRYPT
    • Aggarwal, G.1    Mishra, N.2    Pinkas, B.3
  • 4
    • 4944265699 scopus 로고    scopus 로고
    • Secure information flow by self-composition
    • G. Barthe, P. R. D'Argenio, and T. Rezk. Secure information flow by self-composition. In CSFW, 2004.
    • (2004) CSFW
    • Barthe, G.1    D'Argenio, P.R.2    Rezk, T.3
  • 5
    • 77954739043 scopus 로고
    • The round complexity of secure protocols
    • D. Beaver, S. Micali, and P. Rogaway. The round complexity of secure protocols. In STOC, 1990.
    • (1990) STOC
    • Beaver, D.1    Micali, S.2    Rogaway, P.3
  • 6
    • 70349266254 scopus 로고    scopus 로고
    • Fairplaymp: A system for secure multi-party computation
    • A. Ben-David, N. Nisan, and B. Pinkas. FairplayMP: A system for secure multi-party computation. In CCS, 2008.
    • (2008) CCS
    • Ben-David, A.1    Nisan, N.2    Pinkas, B.3
  • 7
    • 77957606221 scopus 로고    scopus 로고
    • Required information release
    • S. Chong. Required information release. In CSF, 2010.
    • (2010) CSF
    • Chong, S.1
  • 10
    • 67650336319 scopus 로고    scopus 로고
    • A decision procedure for bit-vectors and arrays
    • V. Ganesh and D. L. Dill. A decision procedure for bit-vectors and arrays. In CAV, 2007.
    • (2007) CAV
    • Ganesh, V.1    Dill, D.L.2
  • 13
    • 84868249595 scopus 로고    scopus 로고
    • Privacy-preserving applications on smartphones
    • Y. Huang, P. Chapman, and D. Evans. Privacy-preserving applications on smartphones. In HOTSEC, 2011.
    • (2011) HOTSEC
    • Huang, Y.1    Chapman, P.2    Evans, D.3
  • 14
    • 84914127581 scopus 로고    scopus 로고
    • Faster secure twoparty computation using garbled circuits
    • Y. Huang, D. Evans, J. Katz, and L. Malka. Faster secure twoparty computation using garbled circuits. In USENIX Security, 2011.
    • (2011) USENIX Security
    • Huang, Y.1    Evans, D.2    Katz, J.3    Malka, L.4
  • 15
    • 80755169442 scopus 로고    scopus 로고
    • Automatically optimizing secure computation
    • F. Kerschbaum. Automatically optimizing secure computation. In CCS, 2011.
    • (2011) CCS
    • Kerschbaum, F.1
  • 16
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • J. C. King. Symbolic execution and program testing. Commun. ACM, 19(7):385-394, 1976.
    • (1976) Commun. ACM , vol.19 , Issue.7 , pp. 385-394
    • King, J.C.1
  • 17
    • 85183787592 scopus 로고    scopus 로고
    • LLVM. http://llvm.org.
    • LLVM
  • 19
    • 0348017041 scopus 로고    scopus 로고
    • Information flow inference for ml
    • Jan.
    • F. Pottier and V. Simonet. Information flow inference for ML. ACM TOPLAS, 25(1):117-158, Jan. 2003.
    • (2003) ACM TOPLAS , vol.25 , Issue.1 , pp. 117-158
    • Pottier, F.1    Simonet, V.2
  • 20
    • 51749106501 scopus 로고    scopus 로고
    • Language-based informationflow security
    • A. Sabelfeld and A. C. Myers. Language-based informationflow security. IEEE JSAC, 2003.
    • (2003) IEEE JSAC
    • Sabelfeld, A.1    Myers, A.C.2
  • 22
    • 70450231636 scopus 로고    scopus 로고
    • Program verification using templates over predicate abstraction
    • S. Srivastava and S. Gulwani. Program verification using templates over predicate abstraction. In PLDI, 2009.
    • (2009) PLDI
    • Srivastava, S.1    Gulwani, S.2
  • 23
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. C.-C. Yao. How to generate and exchange secrets. In FOCS, 1986.
    • (1986) FOCS
    • Yao, A.C.-C.1
  • 24
    • 0038559280 scopus 로고    scopus 로고
    • Untrusted hosts and confidentiality: Secure program partitioning
    • S. Zdancewic, L. Zheng, N. Nystrom, and A. C. Myers. Untrusted hosts and confidentiality: secure program partitioning. In SOSP, 2001.
    • (2001) SOSP
    • Zdancewic, S.1    Zheng, L.2    Nystrom, N.3    Myers, A.C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.