메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 404-413

Bounded-concurrent secure two-party computation in a constant number of rounds

Author keywords

Circuit simulation; Computational modeling; Computer science; Computer security; Concurrent computing; Cryptographic protocols; Interleaved codes; Laboratories; Polynomials; Random variables

Indexed keywords

COMPUTER SCIENCE; HASH FUNCTIONS; LABORATORIES; POLYNOMIALS; RANDOM VARIABLES; SECURITY OF DATA;

EID: 84943420008     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SFCS.2003.1238214     Document Type: Conference Paper
Times cited : (24)

References (35)
  • 1
    • 0035166072 scopus 로고    scopus 로고
    • How to go Beyond the Black-Box Simulation Barrier
    • B. Barak. How to go Beyond the Black-Box Simulation Barrier. In 42nd FOCS, pages 106-115, 2001.
    • (2001) 42nd FOCS , pp. 106-115
    • Barak, B.1
  • 2
    • 0036949106 scopus 로고    scopus 로고
    • Constant-Round Coin-Tossing or Realizing the Shared-Random String Model
    • B. Barak. Constant-Round Coin-Tossing or Realizing the Shared-Random String Model. In 43rd FOCS, pages 345-355, 2002.
    • (2002) 43rd FOCS , pp. 345-355
    • Barak, B.1
  • 3
    • 0036294828 scopus 로고    scopus 로고
    • Universal Arguments and their Applications
    • B. Barak and O. Goldreich. Universal Arguments and their Applications. 17th CCC, pages 194-203, 2002.
    • (2002) 17th CCC , pp. 194-203
    • Barak, B.1    Goldreich, O.2
  • 4
    • 0036041101 scopus 로고    scopus 로고
    • Strict Polynomial-Time in Simulation and Extraction
    • B. Barak and Y. Lindell. Strict Polynomial-Time in Simulation and Extraction. In 34th STOC, pages 484-493, 2002.
    • (2002) 34th STOC , pp. 484-493
    • Barak, B.1    Lindell, Y.2
  • 5
    • 85029542707 scopus 로고
    • Foundations of Secure Interactive Computing
    • CRYPTO'91, Springer-Verlag Repetition Lower the Error
    • D. Beaver. Foundations of Secure Interactive Computing. In CRYPTO'91, Springer-Verlag (LNCS 576), pages 377-391, 1991. Repetition Lower the Error
    • (1991) LNCS , vol.576 , pp. 377-391
    • Beaver, D.1
  • 6
    • 0000731055 scopus 로고    scopus 로고
    • Security and Composition of Multiparty Cryptographic Protocols
    • R. Canetti. Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology, 13(1):143-202, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 7
    • 0038721038 scopus 로고    scopus 로고
    • Universally Composable Security: A New Paradigm for Cryptographic Protocols
    • R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 34th STOC, pages 494-503, 2002.
    • (2002) 34th STOC , pp. 494-503
    • Canetti, R.1
  • 8
    • 84880897758 scopus 로고    scopus 로고
    • Universally Composable Commitments
    • Crypto2001
    • R. Canetti and M. Fischlin. Universally Composable Commitments. In Crypto2001, Springer LNCS 2139, pages 19-40, 2001.
    • (2001) Springer LNCS , vol.2139 , pp. 19-40
    • Canetti, R.1    Fischlin, M.2
  • 10
    • 0037605775 scopus 로고    scopus 로고
    • Black-Box Concurrent Zero-Knowledge Requires (almost) Logarithmically Many Rounds
    • R. Canetti, J. Kilian, E. Petrank and A. Rosen. Black-Box Concurrent Zero-Knowledge Requires (almost) Logarithmically Many Rounds. SIAM Jour. on Computing, Vol. 32(1), pages 1-47, 2002.
    • (2002) SIAM Jour. on Computing , vol.32 , Issue.1 , pp. 1-47
    • Canetti, R.1    Kilian, J.2    Petrank, E.3    Rosen, A.4
  • 11
    • 32844458303 scopus 로고    scopus 로고
    • On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions
    • To appear in
    • R. Canetti, E. Kushilevitz and Y. Lindell. On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions. To appear in EuroCrypt2003.
    • EuroCrypt2003
    • Canetti, R.1    Kushilevitz, E.2    Lindell, Y.3
  • 12
    • 0036038991 scopus 로고    scopus 로고
    • Universally Composable Two-Party and Multy-Party Computation
    • R. Canetti, Y. Lindell, R. Ostrovsky and A. Sahai. Universally Composable Two-Party and Multy-Party Computation. In 34th STOC, pages 494-503,2002.
    • (2002) 34th STOC , pp. 494-503
    • Canetti, R.1    Lindell, Y.2    Ostrovsky, R.3    Sahai, A.4
  • 13
    • 84948970500 scopus 로고    scopus 로고
    • Eficient Concurrent Zero-Knowledge in the Auxiliary String Model
    • EuroCrypt2000
    • I. Damgard. Eficient Concurrent Zero-Knowledge in the Auxiliary String Model. In EuroCrypt2000, LNCS 1807, pages 418-430, 2000.
    • (2000) LNCS , vol.1807 , pp. 418-430
    • Damgard, I.1
  • 14
  • 15
    • 0031632567 scopus 로고    scopus 로고
    • Concurrent Zero-Knowledge
    • C. Dwork, M. Naor and A. Sahai. Concurrent Zero-Knowledge. In 30th STOC, pages 409-418, 1998.
    • (1998) 30th STOC , pp. 409-418
    • Dwork, C.1    Naor, M.2    Sahai, A.3
  • 16
    • 84957623615 scopus 로고    scopus 로고
    • Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints
    • Crypto98
    • C. Dwork and A. Sahai. Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints. In Crypto98, Springer LNCS 1462, pages 442-457, 1998.
    • (1998) Springer LNCS , vol.1462 , pp. 442-457
    • Dwork, C.1    Sahai, A.2
  • 20
    • 0029767165 scopus 로고    scopus 로고
    • On the Composition of Zero-Knowledge Proof Systems
    • O. Goldreich and H. Krawczyk. On the Composition of Zero-Knowledge Proof Systems. SIAM Jour. on Computing, Vol. 25(1), pages 169-192, 1996.
    • (1996) SIAM Jour. on Computing , vol.25 , Issue.1 , pp. 169-192
    • Goldreich, O.1    Krawczyk, H.2
  • 21
    • 71149116146 scopus 로고
    • Proofs that Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems
    • O. Goldreich, S. Micali and A. Wigderson. Proofs that Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems. JACM, Vol. 38(1), pp. 691-729, 1991.
    • (1991) JACM , vol.38 , Issue.1 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 22
    • 0023545076 scopus 로고
    • How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority
    • O. Goldreich, S. Micali and A. Wigderson. How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In 19th STOC, pages 218-229, 1987.
    • (1987) 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 23
    • 84955564077 scopus 로고
    • Fair Computation of General Functions in Presence of Immoral Majority
    • CRYPTO'90, Springer-Verlag
    • S. Goldwasser and L. Levin. Fair Computation of General Functions in Presence of Immoral Majority. In CRYPTO'90, Springer-Verlag (LNCS 537), pages 77-93, 1990.
    • (1990) LNCS , vol.537 , pp. 77-93
    • Goldwasser, S.1    Levin, L.2
  • 24
    • 0034830278 scopus 로고    scopus 로고
    • Concurrent and Reset-table Zero-Knowledge in Poly-logarithmic Rounds
    • J. Kilian and E. Petrank. Concurrent and Reset-table Zero-Knowledge in Poly-logarithmic Rounds. In 33rd STOC, pages 560-569, 2001.
    • (2001) 33rd STOC , pp. 560-569
    • Kilian, J.1    Petrank, E.2
  • 25
    • 0032319637 scopus 로고    scopus 로고
    • Lower Bounds for Zero-Knowledge on the Internet
    • J. Kilian, E. Petrank and C. Rackoff. Lower Bounds for Zero-Knowledge on the Internet. In 39th FOCS, pages 484-492, 1998.
    • (1998) 39th FOCS , pp. 484-492
    • Kilian, J.1    Petrank, E.2    Rackoff, C.3
  • 26
    • 0038446804 scopus 로고    scopus 로고
    • Bounded-Concurrent Secure Two-Party Computation Without Setup Assumptions
    • To appear in
    • Y. Lindell. Bounded-Concurrent Secure Two-Party Computation Without Setup Assumptions. To appear in 34th STOC, 2003.
    • (2003) 34th STOC
    • Lindell, Y.1
  • 27
    • 0034854953 scopus 로고    scopus 로고
    • CS Proofs
    • S. Micali. CS Proofs. SIAM Jour. on Computing, Vol. 30 (4), pages 1253-1298, 2000.
    • (2000) SIAM Jour. on Computing , vol.30 , Issue.4 , pp. 1253-1298
    • Micali, S.1
  • 28
    • 84974655726 scopus 로고
    • Secure computation
    • Unpublished manuscript, Preliminary version in CRYPTO'91, Springer-Verlag
    • S. Micali and P. Rogaway. Secure computation. Unpublished manuscript, 1992. Preliminary version in CRYPTO'91, Springer-Verlag (LNCS 576), pages 392-404, 1991.
    • (1991) LNCS , vol.576 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 29
    • 0001448484 scopus 로고
    • Bit Commitment using Pseudorandomness
    • M. Naor. Bit Commitment using Pseudorandomness. Jour. of Cryptology, Vol. 4, pages 151-158, 1991.
    • (1991) Jour. of Cryptology , vol.4 , pp. 151-158
    • Naor, M.1
  • 30
    • 35248833045 scopus 로고    scopus 로고
    • Simulation in Quasi-polynomial Time and its Application to Protocol Composition
    • EuroCrypt2003
    • R. Pass. Simulation in Quasi-polynomial Time and its Application to Protocol Composition. In EuroCrypt2003, Springer LNCS 2656, pages 160-176, 2003.
    • (2003) Springer LNCS , vol.2656 , pp. 160-176
    • Pass, R.1
  • 31
    • 84943423699 scopus 로고    scopus 로고
    • On Deniability in the Common Reference String and Random Oracle Model
    • To appear in
    • R. Pass. On Deniability in the Common Reference String and Random Oracle Model. To appear in Crypto2003
    • Crypto2003
    • Pass, R.1
  • 33
    • 84957621865 scopus 로고    scopus 로고
    • On the Concurrent Composition of Zero-Knowledge Proofs
    • EuroCrypt99
    • R. Richardson and J. Kilian. On the Concurrent Composition of Zero-Knowledge Proofs. In EuroCrypt99, Springer LNCS 1592, pages 415-431, 1999.
    • (1999) Springer LNCS , vol.1592 , pp. 415-431
    • Richardson, R.1    Kilian, J.2
  • 34
    • 84983126760 scopus 로고    scopus 로고
    • A note on the round-complexity of Concurrent Zero-Knowledge
    • Crypto2000
    • A. Rosen. A note on the round-complexity of Concurrent Zero-Knowledge. In Crypto2000, Springer LNCS 1880, pages 451-468, 2000.
    • (2000) Springer LNCS , vol.1880 , pp. 451-468
    • Rosen, A.1
  • 35
    • 0022882770 scopus 로고
    • How to Generate and Exchange Secrets
    • A. Yao. How to Generate and Exchange Secrets. In 27th FOCS, pages 162-167, 1986.
    • (1986) 27th FOCS , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.