메뉴 건너뛰기




Volumn 2442, Issue , 2002, Pages 178-193

On 2-round secure multiparty computation

Author keywords

Lower bounds; Round complexity; Secure multiparty computation

Indexed keywords

INFORMATION THEORY;

EID: 84937440738     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45708-9_12     Document Type: Conference Paper
Times cited : (44)

References (32)
  • 1
    • 0024940038 scopus 로고
    • Non-cryptographic fault-tolerant computing in a constant number of rounds
    • ACM
    • J. Bar-Ilan and D. Beaver. Non-cryptographic fault-tolerant computing in a constant number of rounds. In Proc. 8th ACM PODC, pages 201–209. ACM, 1989.
    • (1989) Proc , pp. 201-209
    • Bar-Ilan, J.1    Beaver, D.2
  • 2
    • 84948952992 scopus 로고    scopus 로고
    • Minimal-Latency Secure Function Evaluation
    • D. Beaver. Minimal-Latency Secure Function Evaluation. In Eurocrypt ’00, pages 335–350, 2000. LNCS No. 1807.
    • (2000) Eurocrypt ’00 , Issue.1807 , pp. 335-350
    • Beaver, D.1
  • 4
    • 0025137207 scopus 로고
    • The round complexity of secure protocols (Extended abstract)
    • D. Beaver, S. Micali, and P. Rogaway. The round complexity of secure protocols (extended abstract). In Proc. 22nd STOC, pages 503–513. ACM, 1990.
    • (1990) Proc , pp. 503-513
    • Beaver, D.1    Micali, S.2    Rogaway, P.3
  • 5
    • 84898960610 scopus 로고    scopus 로고
    • Completeness Theorems for Noncryptographic Fault-Tolerant Distributed Computations
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness Theorems for Noncryptographic Fault-Tolerant Distributed Computations. Proc. 20th STOC88, pp. 1–10.
    • Proc , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 7
    • 0003661492 scopus 로고
    • Bit Optimal Distributed Consensus
    • R. Yaeza-Bates and U. Manber, editors, Plenum Publishing Corporation
    • P. Berman, J. Garay, and K. Perry. Bit Optimal Distributed Consensus. In R. Yaeza-Bates and U. Manber, editors, Computer Science Research, pages 313–322. Plenum Publishing Corporation, 1992.
    • (1992) Computer Science Research , pp. 313-322
    • Berman, P.1    Garay, J.2    Perry, K.3
  • 9
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143–202, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 10
    • 84898947315 scopus 로고    scopus 로고
    • Multiparty Unconditionally Secure Protocols
    • D. Chaum, C. Crepeau, and I. Damgard. Multiparty Unconditionally Secure Protocols. In Proc. 20th STOC88, pages 11–19.
    • Proc , pp. 11-19
    • Chaum, D.1    Crepeau, C.2    Damgard, I.3
  • 11
    • 84870398909 scopus 로고    scopus 로고
    • Secure distributed linear algebra in a constant number of rounds
    • R. Cramer and I. Damgård. Secure distributed linear algebra in a constant number of rounds. In Proc. Crypto 2001.
    • Proc. Crypto 2001
    • Cramer, R.1    Damgård, I.2
  • 12
    • 84957717648 scopus 로고    scopus 로고
    • Efficient multiparty computations with dishonest minority
    • LNCS
    • R. Cramer, I. Damgård, S. Dziembowski, M. Hirt, and T. Rabin. Efficient multiparty computations with dishonest minority. In Eurocrypt ’99, pages 311–326, 1999. LNCS No. 1592.
    • (1999) Eurocrypt ’99 , Issue.1592 , pp. 311-326
    • Cramer, R.1    Damgård, I.2    Dziembowski, S.3    Hirt, M.4    Rabin, T.5
  • 13
    • 0027986369 scopus 로고
    • A minimal model for secure computation (Extended abstract)
    • ACM
    • Uri Feige, Joe Kilian, and Moni Naor. A minimal model for secure computation (extended abstract). In Proc. 26th STOC, pages 554–563. ACM, 1994.
    • (1994) Proc , pp. 554-563
    • Feige, U.1    Kilian, J.2    Naor, M.3
  • 14
    • 0031210863 scopus 로고    scopus 로고
    • An Optimal Algorithm for Synchronous Byzantine Agreement
    • P. Feldman and S. Micali. An Optimal Algorithm for Synchronous Byzantine Agreement. SIAM. J. Computing, 26(2):873–933, 1997.
    • (1997) SIAM , vol.26 , Issue.2 , pp. 873-933
    • Feldman, P.1    Micali, S.2
  • 17
    • 33745155959 scopus 로고    scopus 로고
    • The Round Complexity of Verifiable Secret Sharing and Secure Multicast
    • R. Gennaro, Y. Ishai, E. Kushilevitz, and T. Rabin. The Round Complexity of Verifiable Secret Sharing and Secure Multicast. In Proc. 33th STOC. ACM, 2001.
    • (2001) Proc
    • Gennaro, R.1    Ishai, Y.2    Kushilevitz, E.3    Rabin, T.4
  • 18
    • 0029181976 scopus 로고
    • Achieving Independence Efficiently and Securely
    • Rosario Gennaro. Achieving Independence Efficiently and Securely. In Proc. 14th ACM PODC, pages 130–136. ACM, 1995.
    • (1995) Proc , pp. 130-136
    • Gennaro, R.1
  • 21
    • 0023545076 scopus 로고
    • How to Play Any Mental Game
    • O. Goldreich, S. Micali, and A. Wigderson. How to Play Any Mental Game. In Proc. 19th STOC, pages 218–229. ACM, 1987.
    • (1987) Proc , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 22
    • 0030718794 scopus 로고    scopus 로고
    • Private simultaneous messages protocols with applications
    • Y. Ishai and E. Kushilevitz. Private simultaneous messages protocols with applications. In ISTCS97, pages 174–184, 1997.
    • (1997) ISTCS97 , pp. 174-184
    • Ishai, Y.1    Kushilevitz, E.2
  • 23
    • 33745854210 scopus 로고    scopus 로고
    • Randomizing polynomials: A new representation with applications to round-efficient secure computation
    • Y. Ishai and E. Kushilevitz. Randomizing polynomials: A new representation with applications to round-efficient secure computation. In Proc. 41st FOCS, 2000.
    • (2000) Proc
    • Ishai, Y.1    Kushilevitz, E.2
  • 24
    • 17744373926 scopus 로고    scopus 로고
    • Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials
    • Y. Ishai and E. Kushilevitz. Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials. In Proc. ICALP ’02.
    • Proc. ICALP ’02
    • Ishai, Y.1    Kushilevitz, E.2
  • 26
    • 35048833033 scopus 로고    scopus 로고
    • Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
    • Y. Lindell. Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. In Crypto ’01, pages 171–189, 2001. LNCS No. 2139.
    • (2001) Crypto ’01 , Issue.2139 , pp. 171-189
    • Lindell, Y.1
  • 28
    • 85027164480 scopus 로고
    • How to withstand mobile virus attacks
    • R. Ostrovsky and M. Yung. How to withstand mobile virus attacks. In Proc. 10th ACM PODC, pages 51–59. ACM, 1991.
    • (1991) Proc , pp. 51-59
    • Ostrovsky, R.1    Yung, M.2
  • 29
    • 84976810569 scopus 로고
    • Reaching Agreement in the Presence of Faults
    • M. Pease, R. Shostak, and L. Lamport. Reaching Agreement in the Presence of Faults. Journal of the ACM, 27(2):228–234, 1980.
    • (1980) Journal of the ACM , vol.27 , Issue.2 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 30
    • 0024859552 scopus 로고
    • Verifiable Secret Sharing and Multiparty Protocols with Honest Majority
    • T. Rabin and M. Ben-Or. Verifiable Secret Sharing and Multiparty Protocols with Honest Majority. In Proc. 21st STOC, pages 73–85. ACM, 1989.
    • (1989) Proc , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 31
    • 0033309271 scopus 로고    scopus 로고
    • Non-Interactive CryptoComputing For NC1
    • T. Sander, A. Young, and M. Yung. Non-Interactive CryptoComputing For NC1. In Proc. 40th FOCS, pages 554–567. IEEE, 1999.
    • (1999) Proc , pp. 554-567
    • Sander, T.1    Young, A.2    Yung, M.3
  • 32
    • 0022882770 scopus 로고
    • How to Generate and Exchange Secrets
    • A. C-C. Yao. How to Generate and Exchange Secrets. In Proc. 27th FOCS, pages 162–167. IEEE, 1986.
    • (1986) Proc , pp. 162-167
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.