메뉴 건너뛰기




Volumn 8782, Issue , 2014, Pages 10-28

Adaptive versus static security in the UC Model

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; COMPUTERS;

EID: 84910002768     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-12475-9_2     Document Type: Article
Times cited : (8)

References (16)
  • 1
    • 84873943605 scopus 로고    scopus 로고
    • A full proof of the bgw protocol for perfectly-secure multiparty computation
    • Asharov, G., Lindell, Y.: A full proof of the bgw protocol for perfectly-secure multiparty computation. IACR Cryptology ePrint Archive 2011, 136 (2011)
    • (2011) IACR Cryptology ePrint Archive , vol.2011 , pp. 136
    • Asharov, G.1    Lindell, Y.2
  • 2
    • 85029542707 scopus 로고
    • Foundations of secure interactive computing
    • Feigenbaum, J. (ed.), Springer, Heidelberg
    • Beaver, D.: Foundations of secure interactive computing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 377-391. Springer, Heidelberg (1992)
    • (1992) CRYPTO 1991. LNCS , vol.576 , pp. 377-391
    • Beaver, D.1
  • 4
    • 79958004492 scopus 로고    scopus 로고
    • Semi-homomorphic encryption and multiparty computation
    • Paterson, K.G. (ed.), Springer, Heidelberg
    • Bendlin, R., Damgård, I., Orlandi, C., Zakarias, S.: Semi-homomorphic encryption and multiparty computation. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 169-188. Springer, Heidelberg (2011)
    • (2011) EUROCRYPT 2011. LNCS , vol.6632 , pp. 169-188
    • Bendlin, R.1    Damgård, I.2    Orlandi, C.3    Zakarias, S.4
  • 5
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Las Vegas, Nevada, October 14-17, IEEE
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd Annual Symposium on Foundations of Computer Science, Las Vegas, Nevada, October 14-17, pp. 136-145. IEEE (2001)
    • (2001) 42nd Annual Symposium on Foundations of Computer Science , pp. 136-145
    • Canetti, R.1
  • 6
    • 4344713032 scopus 로고    scopus 로고
    • Adaptive versus nonadaptive security of multi-party protocols
    • Canetti, R., Damgård, I., Dziembowski, S., Ishai, Y., Malkin, T.: Adaptive versus nonadaptive security of multi-party protocols. J. Cryptology 17(3), 153-207 (2004)
    • (2004) J. Cryptology , vol.17 , Issue.3 , pp. 153-207
    • Canetti, R.1    Damgård, I.2    Dziembowski, S.3    Ishai, Y.4    Malkin, T.5
  • 10
    • 84957717648 scopus 로고    scopus 로고
    • Efficient multiparty computations secure against an adaptive adversary
    • Stern, J. (ed.), Springer, Heidelberg
    • Cramer, R., Damgård, I., Dziembowski, S., Hirt, M., Rabin, T.: Efficient multiparty computations secure against an adaptive adversary. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 311-326. Springer, Heidelberg (1999)
    • (1999) EUROCRYPT 1999. LNCS , vol.1592 , pp. 311-326
    • Cramer, R.1    Damgård, I.2    Dziembowski, S.3    Hirt, M.4    Rabin, T.5
  • 11
    • 84864975035 scopus 로고    scopus 로고
    • Multiparty computation from somewhat homomorphic encryption
    • Safavi-Naini, R., Canetti, R. (eds.), Springer, Heidelberg
    • Damgård, I., Pastro, V., Smart, N., Zakarias, S.: Multiparty computation from somewhat homomorphic encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 643-662. Springer, Heidelberg (2012)
    • (2012) CRYPTO 2012. LNCS , vol.7417 , pp. 643-662
    • Damgård, I.1    Pastro, V.2    Smart, N.3    Zakarias, S.4
  • 13
    • 84858315630 scopus 로고    scopus 로고
    • Constructive cryptography - A new paradigm for security definitions and proofs
    • Mödersheim, S., Palamidessi, C. (eds.), Springer, Heidelberg
    • Maurer, U.: Constructive cryptography - A new paradigm for security definitions and proofs. In: Mödersheim, S., Palamidessi, C. (eds.) TOSCA 2011. LNCS, vol. 6993, pp. 33-56. Springer, Heidelberg (2012)
    • (2012) TOSCA 2011. LNCS , vol.6993 , pp. 33-56
    • Maurer, U.1
  • 14
    • 84974655726 scopus 로고
    • Secure computation
    • Feigenbaum, J. (ed.), Springer, Heidelberg
    • Micali, S., Rogaway, P.: Secure computation. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 392-404. Springer, Heidelberg (1992)
    • (1992) CRYPTO 1991. LNCS , vol.576 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 15
    • 84865506559 scopus 로고    scopus 로고
    • A new approach to practical activesecure two-party computation
    • Safavi-Naini, R., Canetti, R. (eds.), Springer, Heidelberg
    • Nielsen, J.B., Nordholt, P.S., Orlandi, C., Burra, S.S.: A new approach to practical activesecure two-party computation. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 681-700. Springer, Heidelberg (2012)
    • (2012) CRYPTO 2012. LNCS , vol.7417 , pp. 681-700
    • Nielsen, J.B.1    Nordholt, P.S.2    Orlandi, C.3    Burra, S.S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.