메뉴 건너뛰기




Volumn 8270 LNCS, Issue PART 2, 2013, Pages 201-220

Fair and efficient secure multiparty computation with reputation systems

Author keywords

new models; reputation systems; secure multiparty computation

Indexed keywords

CURRENT SITUATION; FORMAL DEFINITION; REPUTATION SYSTEMS; SECURE COMPUTATION; SECURE MULTI-PARTY COMPUTATION; THEORETICAL STUDY;

EID: 84892377298     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-42045-0_11     Document Type: Conference Paper
Times cited : (20)

References (21)
  • 1
    • 38049082907 scopus 로고    scopus 로고
    • Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Aumann, Y., Lindell, Y.: Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137-156. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 137-156
    • Aumann, Y.1    Lindell, Y.2
  • 2
    • 84926094916 scopus 로고    scopus 로고
    • Incentives in Peer-to-Peer Systems
    • ch. 23. Cambridge University Press
    • Babaioff, M., Chuang, J., Feldman, M.: Incentives in Peer-to-Peer Systems. In: Algorithmic Game Theory, ch. 23. Cambridge University Press (2007)
    • (2007) Algorithmic Game Theory
    • Babaioff, M.1    Chuang, J.2    Feldman, M.3
  • 3
    • 84898960610 scopus 로고
    • Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In: 20th STOC, pp. 1-10 (1988)
    • (1988) 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 4
    • 70350379222 scopus 로고    scopus 로고
    • Secure Multiparty Computation Goes Live
    • Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg
    • Bogetoft, P., et al.: Secure Multiparty Computation Goes Live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 325-343. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5628 , pp. 325-343
    • Bogetoft, P.1
  • 5
    • 57049188348 scopus 로고    scopus 로고
    • Sharemind: A Framework for Fast Privacy-Preserving Computations
    • Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
    • Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A Framework for Fast Privacy-Preserving Computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192-206. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 192-206
    • Bogdanov, D.1    Laur, S.2    Willemson, J.3
  • 6
    • 0000731055 scopus 로고    scopus 로고
    • Security and Composition of Multiparty Cryptographic Protocols
    • Canetti, R.: Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology 13(1), 143-202 (2000)
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 7
    • 84898947315 scopus 로고
    • Multi-party Unconditionally Secure Protocols
    • Chaum, D., Crépeau, C., Damgård, I.: Multi-party Unconditionally Secure Protocols. In: 20th STOC, pp. 11-19 (1988)
    • (1988) 20th STOC , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgård, I.3
  • 8
    • 0012610677 scopus 로고
    • Limits on the Security of Coin Flips when Half the Processors are Faulty
    • Cleve, R.: Limits on the Security of Coin Flips when Half the Processors are Faulty. In: 18th STOC, pp. 364-369 (1986)
    • (1986) 18th STOC , pp. 364-369
    • Cleve, R.1
  • 9
    • 77949608607 scopus 로고    scopus 로고
    • From Passive to Covert Security at Low Cost
    • Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
    • Damgård, I., Geisler, M., Nielsen, J.B.: From Passive to Covert Security at Low Cost. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 128-145. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 128-145
    • Damgård, I.1    Geisler, M.2    Nielsen, J.B.3
  • 10
    • 33745124039 scopus 로고    scopus 로고
    • Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Damgård, I., Ishai, Y.: Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 378-394. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 378-394
    • Damgård, I.1    Ishai, Y.2
  • 12
    • 84926072615 scopus 로고    scopus 로고
    • Manipulation-Resistant Reputation Systems
    • ch. 27. Cambridge University Press
    • Friedman, E., Resnick, P., Sami, R.: Manipulation-Resistant Reputation Systems. In: Algorithmic Game Theory, ch. 27. Cambridge University Press (2007)
    • (2007) Algorithmic Game Theory
    • Friedman, E.1    Resnick, P.2    Sami, R.3
  • 15
    • 0023545076 scopus 로고
    • How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority
    • For details see 14
    • Goldreich, O., Micali, S., Wigderson, A.: How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In: 19th STOC, pp. 218-229 (1987), For details see [14]
    • (1987) 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 16
    • 44449160882 scopus 로고    scopus 로고
    • Efficient Two Party and Multi Party Computation Against Covert Adversaries
    • Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
    • Goyal, V., Mohassel, P., Smith, A.: Efficient Two Party and Multi Party Computation Against Covert Adversaries. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 289-306. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 289-306
    • Goyal, V.1    Mohassel, P.2    Smith, A.3
  • 17
    • 80051976682 scopus 로고    scopus 로고
    • Secure Computation on the Web: Computing without Simultaneous Interaction
    • Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
    • Halevi, S., Lindell, Y., Pinkas, B.: Secure Computation on the Web: Computing without Simultaneous Interaction. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 132-150. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6841 , pp. 132-150
    • Halevi, S.1    Lindell, Y.2    Pinkas, B.3
  • 18
    • 79952946379 scopus 로고    scopus 로고
    • On Achieving the "Best of BothWorlds" in Secure Multiparty Computation
    • Ishai, Y., Katz, J., Kushilevitz, E., Lindell, Y., Petrank, E.: On Achieving the "Best of BothWorlds" in Secure Multiparty Computation. SIAM J. Comput. 40(1), 122-141 (2011)
    • (2011) SIAM J. Comput. , vol.40 , Issue.1 , pp. 122-141
    • Ishai, Y.1    Katz, J.2    Kushilevitz, E.3    Lindell, Y.4    Petrank, E.5
  • 19
    • 84947403595 scopus 로고
    • Probability Inequalities for Sums of Bounded Random Variables
    • Hoeffding, W.: Probability Inequalities for Sums of Bounded Random Variables. Journal of the American Statistical Association 58(301), 13-30 (1963)
    • (1963) Journal of the American Statistical Association , vol.58 , Issue.301 , pp. 13-30
    • Hoeffding, W.1
  • 21
    • 0024859552 scopus 로고
    • Verifiable Secret Sharing and Multi-party Protocols with Honest Majority
    • Rabin, T., Ben-Or, M.: Verifiable Secret Sharing and Multi-party Protocols with Honest Majority. In: 21st STOC, pp. 73-85 (1989)
    • (1989) 21st STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.