메뉴 건너뛰기




Volumn 60, Issue 6, 2014, Pages 3123-3143

On the efficiency of classical and quantum secure function evaluation

Author keywords

lower bounds; oblivious transfer; quantum cryptography; two party computation; Unconditional security

Indexed keywords

EFFICIENCY; QUANTUM CRYPTOGRAPHY; RANDOM PROCESSES;

EID: 84901321090     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2014.2314467     Document Type: Article
Times cited : (7)

References (65)
  • 1
    • 77956992510 scopus 로고    scopus 로고
    • On the efficiency of classical and quantum oblivious transfer reductions
    • Berlin, Germany: Springer-Verlag
    • S. Winkler and J. Wullschleger, "On the efficiency of classical and quantum oblivious transfer reductions," in Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science), vol. 6223. Berlin, Germany: Springer-Verlag, 2010, pp. 707-723.
    • (2010) Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science) , vol.6223 , pp. 707-723
    • Winkler, S.1    Wullschleger, J.2
  • 2
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • Nov
    • A. C. Yao, "Protocols for secure computations," in Proc. 23rd Annu. IEEE Symp. FOCS, Nov. 1982, pp. 160-164.
    • (1982) Proc. 23rd Annu. IEEE Symp. FOCS , pp. 160-164
    • Yao, A.C.1
  • 4
    • 84898989941 scopus 로고
    • Founding cryptography on oblivious transfer
    • J. Kilian, "Founding cryptography on oblivious transfer," in Proc. 20th Annu. ACM STOC, 1988, pp. 20-31.
    • (1988) Proc. 20th Annu. ACM STOC , pp. 20-31
    • Kilian, J.1
  • 6
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • S. Even, O. Goldreich, and A. Lempel, "A randomized protocol for signing contracts," Commun. ACM, vol. 28, no. 6, pp. 637-647, 1985.
    • (1985) Commun. ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 12
    • 33745181204 scopus 로고    scopus 로고
    • New monotones and lower bounds in unconditional two-party computation
    • New York, NY, USA: Springer-Verlag
    • S. Wolf and J. Wullschleger, "New monotones and lower bounds in unconditional two-party computation," in Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science), vol. 3621. New York, NY, USA: Springer-Verlag, 2005, pp. 467-477.
    • (2005) Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science) , vol.3621 , pp. 467-477
    • Wolf, S.1    Wullschleger, J.2
  • 13
    • 0024132071 scopus 로고
    • Achieving oblivious transfer using weakened security assumptions (extended abstract)
    • Oct
    • C. Crépeau and J. Kilian, "Achieving oblivious transfer using weakened security assumptions (extended abstract)," in Proc. 29th Annu. IEEE Symp. FOCS, Oct. 1988, pp. 42-52.
    • (1988) Proc. 29th Annu. IEEE Symp. FOCS , pp. 42-52
    • Crépeau, C.1    Kilian, J.2
  • 14
    • 23944515855 scopus 로고    scopus 로고
    • Efficient unconditional oblivious transfer from almost any noisy channel
    • Security in Communication Networks - 4th International Conference, SCN 2004
    • C. Crépeau, K. Morozov, and S. Wolf, "Efficient unconditional oblivious transfer from almost any noisy channel," in Proc. 4th Conf. SCN, vol. 3352. 2004, pp. 47-59. (Pubitemid 41190996)
    • (2005) Lecture Notes in Computer Science , vol.3352 , pp. 47-59
    • Crepeau, C.1    Morozov, K.2    Wolf, S.3
  • 15
    • 26444482584 scopus 로고    scopus 로고
    • Unfair noisy channels and oblivious transfer
    • I. Damgård, S. Fehr, K. Morozov, and L. Salvail, "Unfair noisy channels and oblivious transfer," in Proc. TCC, vol. 2951. 2004, pp. 355-373.
    • (2004) Proc. TCC , vol.2951 , pp. 355-373
    • Damgård, I.1    Fehr, S.2    Morozov, K.3    Salvail, L.4
  • 16
    • 70350627590 scopus 로고    scopus 로고
    • Oblivious transfer from weak noisy channels
    • O. Reingold, Ed. Berlin, Germany: Springer-Verlag
    • J. Wullschleger, "Oblivious transfer from weak noisy channels," in Theory of Cryptography (Lecture Notes in Computer Science), vol. 5444, O. Reingold, Ed. Berlin, Germany: Springer-Verlag, 2009, pp. 332-349.
    • (2009) Theory of Cryptography (Lecture Notes in Computer Science) , vol.5444 , pp. 332-349
    • Wullschleger, J.1
  • 18
  • 19
    • 84957712978 scopus 로고    scopus 로고
    • On the foundations of oblivious transfer
    • Advances in Cryptology - EUROCRYPT '98
    • C. Cachin, "On the foundations of oblivious transfer," in Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science), vol. 1403. New York, NY, USA: Springer-Verlag, 1998, pp. 361-374. (Pubitemid 128081498)
    • (1998) Lecture notes in computer science , Issue.1403 , pp. 361-374
    • Cachin, C.1
  • 20
    • 84957697395 scopus 로고    scopus 로고
    • On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
    • New York, NY, USA: Springer-Verlag
    • I. Damgård, J. Kilian, and L. Salvail, "On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions," in Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science), vol. 1592. New York, NY, USA: Springer-Verlag, 1999, pp. 56-73.
    • (1999) Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science) , vol.1592 , pp. 56-73
    • Damgård, I.1    Kilian, J.2    Salvail, L.3
  • 21
    • 21144437147 scopus 로고    scopus 로고
    • Oblivious transfers and privacy amplification
    • DOI 10.1007/s00145-002-0146-4
    • G. Brassard, C. Crépeau, and S. Wolf, "Oblivious transfers and privacy amplification," J. Cryptol., vol. 16, no. 4, pp. 219-237, 2003. (Pubitemid 40877274)
    • (2003) Journal of Cryptology , vol.16 , Issue.4 , pp. 219-237
    • Brassard, G.1    Crepeau, C.2    Wolf, S.3
  • 25
    • 4243104359 scopus 로고
    • Security of quantum protocols against coherent measurements
    • A. C.-C. Yao, "Security of quantum protocols against coherent measurements," in Proc. 27th Annu. ACM STOC, 1995, pp. 67-75.
    • (1995) Proc. 27th Annu. ACM STOC , pp. 67-75
    • Yao, A.C.-C.1
  • 27
    • 77954644441 scopus 로고    scopus 로고
    • Universally composable quantum multi-party computation
    • H. Gilbert, Ed. Berlin, Germany: Springer-Verlag
    • D. Unruh, "Universally composable quantum multi-party computation," in Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science), vol. 6110, H. Gilbert, Ed. Berlin, Germany: Springer-Verlag, 2010, pp. 486-505.
    • (2010) Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science) , vol.6110 , pp. 486-505
    • Unruh, D.1
  • 28
    • 0029702967 scopus 로고    scopus 로고
    • Correlated pseudorandomness and the complexity of private computations
    • D. Beaver, "Correlated pseudorandomness and the complexity of private computations," in Proc. 28th Annu. ACM STOC, 1996, pp. 479-488.
    • (1996) Proc. 28th Annu. ACM STOC , pp. 479-488
    • Beaver, D.1
  • 29
    • 84957050617 scopus 로고    scopus 로고
    • Information-theoretic cryptography
    • M. Wiener, Ed. Berlin, Germany: Springer-Verlag
    • U. Maurer, "Information-theoretic cryptography," in Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science), vol. 1666, M. Wiener, Ed. Berlin, Germany: Springer-Verlag, 1999, p. 785.
    • (1999) Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science) , vol.1666 , pp. 785
    • Maurer, U.1
  • 30
    • 45249110618 scopus 로고    scopus 로고
    • New monotones and lower bounds in unconditional two-party computation
    • Jun
    • S. Wolf and J. Wullschleger, "New monotones and lower bounds in unconditional two-party computation," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2792-2797, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2792-2797
    • Wolf, S.1    Wullschleger, J.2
  • 32
    • 80054795248 scopus 로고    scopus 로고
    • Assisted common information: Further results
    • Aug
    • V. Prabhakaran and M. Prabhakaran, "Assisted common information: Further results," in Proc. IEEE ISIT, Aug. 2011, pp. 2861-2865.
    • (2011) Proc. IEEE ISIT , pp. 2861-2865
    • Prabhakaran, V.1    Prabhakaran, M.2
  • 33
    • 45249091424 scopus 로고    scopus 로고
    • A combinatorial approach to deriving lower bounds for perfectly secure oblivious transfer reductions
    • Jun
    • K. Kurosawa, W. Kishimoto, and T. Koshiba, "A combinatorial approach to deriving lower bounds for perfectly secure oblivious transfer reductions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2566-2571, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2566-2571
    • Kurosawa, K.1    Kishimoto, W.2    Koshiba, T.3
  • 34
    • 35048856983 scopus 로고    scopus 로고
    • A quantitative approach to reductions in secure computation
    • M. Naor, Ed. Berlin, Germany: Springer-Verlag
    • A. Beimel and T. Malkin, "A quantitative approach to reductions in secure computation," in Theory of Cryptography (Lecture Notes in Computer Science), vol. 2951, M. Naor, Ed. Berlin, Germany: Springer-Verlag, 2004, pp. 238-257.
    • (2004) Theory of Cryptography (Lecture Notes in Computer Science) , vol.2951 , pp. 238-257
    • Beimel, A.1    Malkin, T.2
  • 36
    • 45249098450 scopus 로고    scopus 로고
    • On oblivious transfer capacity
    • R. Ahlswede and I. Csiszar, "On oblivious transfer capacity," in Proc. ISIT, 2007, pp. 2061-2064.
    • (2007) Proc. ISIT , pp. 2061-2064
    • Ahlswede, R.1    Csiszar, I.2
  • 37
    • 0001336918 scopus 로고    scopus 로고
    • Unconditionally secure quantum bit commitment is impossible
    • D. Mayers, "Unconditionally secure quantum bit commitment is impossible," Phys. Rev. Lett., vol. 78, no. 17, pp. 3414-3417, 1997. (Pubitemid 127657375)
    • (1997) Physical Review Letters , vol.78 , Issue.17 , pp. 3414-3417
    • Mayers, D.1
  • 38
    • 0001260566 scopus 로고    scopus 로고
    • Is quantum bit commitment really possible?
    • H. K. Lo and H. F. Chau, "Is quantum bit commitment really possible," Phys. Rev. Lett., vol. 78, no. 17, pp. 3410-3413, 1997. (Pubitemid 127657374)
    • (1997) Physical Review Letters , vol.78 , Issue.17 , pp. 3410-3413
    • Lo, H.-K.1    Chau, H.F.2
  • 39
    • 0001236013 scopus 로고    scopus 로고
    • Insecurity of quantum secure computations
    • H. K. Lo, "Insecurity of quantum secure computations," Phys. Rev. A, vol. 56, no. 2, p. 1154, 1997.
    • (1997) Phys. Rev. A , vol.56 , Issue.2 , pp. 1154
    • Lo, H.K.1
  • 40
    • 72449167006 scopus 로고    scopus 로고
    • On the power of two-party quantum cryptography
    • M. Matsui, Ed. New York, NY, USA: Springer-Veralg
    • L. Salvail, C. Schaffner, and M. Sotáková, "On the power of two-party quantum cryptography," in ASIACRYPT (Lecture Notes in Computer Science), vol. 5912, M. Matsui, Ed. New York, NY, USA: Springer-Veralg, 2009, pp. 70-87.
    • (2009) ASIACRYPT (Lecture Notes in Computer Science) , vol.5912 , pp. 70-87
    • Salvail, L.1    Schaffner, C.2    Sotáková, M.3
  • 42
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • C. Cachin and J. Camenisch, Eds. New York, NY, USA: Springer-Veralg
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in EUROCRYPT (Lecture Notes in Computer Science), vol. 3027, C. Cachin and J. Camenisch, Eds. New York, NY, USA: Springer-Veralg, 2004, pp. 523-540.
    • (2004) EUROCRYPT (Lecture Notes in Computer Science) , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 43
    • 33846181385 scopus 로고    scopus 로고
    • Ph.D. dissertation, Dept. Comput. Sci., ETH, Zürich, Switzerland
    • R. Renner, "Security of quantum key distribution," Ph.D. dissertation, Dept. Comput. Sci., ETH, Zürich, Switzerland, 2005.
    • (2005) Security of Quantum Key Distribution
    • Renner, R.1
  • 47
  • 48
    • 35048830930 scopus 로고    scopus 로고
    • Pseudo-signatures, broadcast, and multi-party computation from correlated randomness
    • New York, NY, USA: Springer-Verlag
    • M. Fitzi, S. Wolf, and J. Wullschleger, "Pseudo-signatures, broadcast, and multi-party computation from correlated randomness," in Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science), vol. 3152. New York, NY, USA: Springer-Verlag, 2004, pp. 562-578.
    • (2004) Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science) , vol.3152 , pp. 562-578
    • Fitzi, M.1    Wolf, S.2    Wullschleger, J.3
  • 49
    • 0006932810 scopus 로고
    • Common information is far less than mutual information
    • P. Gacs and J. Körner, "Common information is far less than mutual information," Problems Control Inf. Theory, vol. 2, no. 2, pp. 149-162, 1973.
    • (1973) Problems Control Inf. Theory , vol.2 , Issue.2 , pp. 149-162
    • Gacs, P.1    Körner, J.2
  • 54
  • 55
    • 23944463739 scopus 로고    scopus 로고
    • Commitment capacity of discrete memoryless channels
    • A. Winter, A. C. A. Nascimento, and H. Imai, "Commitment capacity of discrete memoryless channels," in Proc. IMA Int. Conf., 2003, pp. 35-51.
    • (2003) Proc. IMA Int. Conf , pp. 35-51
    • Winter, A.1    Nascimento, A.C.A.2    Imai, H.3
  • 56
    • 1142301536 scopus 로고    scopus 로고
    • Continuity of quantum conditional information
    • DOI 10.1088/0305-4470/37/5/L01, PII S0305447004731716
    • R. Alicki and M. Fannes, "Continuity of quantum conditional information," J. Phys. A, Math. General, vol. 37, no. 5, pp. L55-L57, 2004. (Pubitemid 38214163)
    • (2004) Journal of Physics A: Mathematical and General , vol.37 , Issue.5
    • Alicki, R.1    Fannes, M.2
  • 57
    • 0000937315 scopus 로고
    • Entropy inequalities
    • H. Araki and E. H. Lieb, "Entropy inequalities," Commun. Math. Phys., vol. 18, no. 2, pp. 160-170, 1970.
    • (1970) Commun. Math. Phys , vol.18 , Issue.2 , pp. 160-170
    • Araki, H.1    Lieb, E.H.2
  • 58
    • 80052196847 scopus 로고    scopus 로고
    • Impossibility of growing quantum bit commitments
    • Aug
    • S. Winkler, M. Tomamichel, S. Hengl, and R. Renner, "Impossibility of growing quantum bit commitments," Phys. Rev. Lett., vol. 107, p. 090502, Aug. 2011.
    • (2011) Phys. Rev. Lett , vol.107 , pp. 090502
    • Winkler, S.1    Tomamichel, M.2    Hengl, S.3    Renner, R.4
  • 60
    • 84968466834 scopus 로고
    • Positive functions on C*-algebras
    • W. F. Stinespring, "Positive functions on C*-algebras," Proc. Amer. Math. Soc., vol. 6, no. 2, pp. 211-216, 1955.
    • (1955) Proc. Amer. Math. Soc , vol.6 , Issue.2 , pp. 211-216
    • Stinespring, W.F.1
  • 61
    • 84857779174 scopus 로고    scopus 로고
    • Unconditional security from noisy quantum storage
    • Mar
    • R. Konig, S. Wehner, and J. Wullschleger, "Unconditional security from noisy quantum storage," IEEE Trans. Inf. Theory, vol. 58, no. 3, pp. 1962-1984, Mar. 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.3 , pp. 1962-1984
    • Konig, R.1    Wehner, S.2    Wullschleger, J.3
  • 63
    • 84947403595 scopus 로고
    • Probability inequalities for sums of bounded random variables
    • W. Hoeffding, "Probability inequalities for sums of bounded random variables," J. Amer. Statist. Assoc., vol. 58, no. 301, pp. 13-30, 1963.
    • (1963) J. Amer. Statist. Assoc , vol.58 , Issue.301 , pp. 13-30
    • Hoeffding, W.1
  • 64
    • 77957004959 scopus 로고    scopus 로고
    • Sampling in a quantum population, and applications
    • New York, NY, USA: Springer-Verlag
    • N. J. Bouman and S. Fehr, "Sampling in a quantum population, and applications," in CRYPTO (Lecture Notes in Computer Science), vol. 6223. New York, NY, USA: Springer-Verlag, 2010, pp. 724-741.
    • (2010) CRYPTO (Lecture Notes in Computer Science) , vol.6223 , pp. 724-741
    • Bouman, N.J.1    Fehr, S.2
  • 65
    • 51849126899 scopus 로고    scopus 로고
    • Cryptographic complexity of multi-party computation problems: Classifications and separations
    • D. Wagner, Ed. Berlin, Germany: Springer-Verlag
    • M. Prabhakaran and M. Rosulek, "Cryptographic complexity of multi-party computation problems: Classifications and separations," in Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science), vol. 5157, D. Wagner, Ed. Berlin, Germany: Springer-Verlag, 2008, pp. 262-279.
    • (2008) Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science) , vol.5157 , pp. 262-279
    • Prabhakaran, M.1    Rosulek, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.