메뉴 건너뛰기




Volumn 1977, Issue , 2000, Pages 117-129

Efficient asynchronous secure multiparty distributed computation

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84947784853     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44495-5_11     Document Type: Conference Paper
Times cited : (27)

References (19)
  • 1
    • 0024940038 scopus 로고
    • Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction
    • Judit Bar-Ilan and Donald Beaver. Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction. In Proceedings of 8th ACM PODC, pages 201–210, August 1989. 118
    • (1989) Proceedings of 8Th ACM PODC , pp. 201-210
    • Bar-Ilan, J.1    Beaver, D.2
  • 2
    • 33746365751 scopus 로고
    • Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
    • Donald Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology, pages 75–122, 1991.117
    • (1991) Journal of Cryptology , pp. 75-122
    • Beaver, D.1
  • 3
    • 84979502594 scopus 로고
    • Security with low communication overhead (Extended abstract)
    • Donald Beaver, Joan Feigenbaum, Joe Kilian, and Phillip Rogaway. Security with low communication overhead (extended abstract). In CRYPTO’90, pages 62–76, 1990.118
    • (1990) CRYPTO’90 , pp. 62-76
    • Beaver, D.1    Feigenbaum, J.2    Kilian, J.3    Rogaway, P.4
  • 4
    • 0025137207 scopus 로고
    • The round complexity of secure protocols(Extended abstract)
    • Donald Beaver, Silvio Micali, and Phillip Rogaway. The round complexity of secure protocols(extended abstract). In Proceedings of 22nd ACM STOC, pages 503–513, 1990.118
    • (1990) Proceedings of 22Nd ACM STOC , pp. 503-513
    • Beaver, D.1    Micali, S.2    Rogaway, P.3
  • 5
    • 0027188428 scopus 로고
    • Asynchronous secure computations
    • M. Ben-Or, R. Canetti, and O. Goldreich. Asynchronous secure computations. In Proceedings of 25th ACM STOC, pages 52–61, 1993.117, 117, 118, 118, 118, 118, 118, 120, 121, 121, 121, 122, 122, 126, 126, 129
    • (1993) Proceedings of 25Th ACM STOC , pp. 52-61
    • Ben-Or, M.1    Canetti, R.2    Goldreich, O.3
  • 6
    • 84898960610 scopus 로고
    • Completeness theorems for noncryptographic fault-tolerant distributed computation
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic fault-tolerant distributed computation. In Proceedings of 20th ACM STOC, pages 1–10, 1988.117, 120
    • (1988) Proceedings of 20Th ACM STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 7
    • 85008184918 scopus 로고
    • Asynchronous secure computation with optimal resilience
    • M. Ben-Or, B. Kelmer, and T. Rabin. Asynchronous secure computation with optimal resilience. In Proceedings of 13th ACM PODC, pages 183–192, 1994.117, 118, 118, 120, 121, 121
    • (1994) Proceedings of 13Th ACM PODC , pp. 183-192
    • Ben-Or, M.1    Kelmer, B.2    Rabin, T.3
  • 8
    • 0021650418 scopus 로고
    • An asynchronous_(N−1)/3_-resilient consensus protocol
    • G. Bracha. An asynchronous _(n − 1)/3_-resilient consensus protocol. In Proceedings of 3rd ACM PODC, pages 154–162, 1984.119
    • (1984) Proceedings of 3Rd ACM PODC , pp. 154-162
    • Bracha, G.1
  • 12
    • 0002626155 scopus 로고    scopus 로고
    • Efficient general secure multiparty computation from any linear secret sharing scheme
    • R. Cramer, I. Damgard, and U. Maurer. Efficient general secure multiparty computation from any linear secret sharing scheme. In EUROCRYPT2000. Springer-Verlag, 2000.121, 122
    • (2000) EUROCRYPT2000. Springer-Verlag
    • Cramer, R.1    Damgard, I.2    Maurer, U.3
  • 14
    • 0026985378 scopus 로고
    • Communication complexity of secure computation
    • Matthew K. Franklin and Moti Yung. Communication complexity of secure computation. In Proceedings of 24th ACM STOC, pages 699–710, 1992.118
    • (1992) Proceedings of 24Th ACM STOC , pp. 699-710
    • Franklin, M.K.1    Yung, M.2
  • 15
    • 0031628398 scopus 로고    scopus 로고
    • Simplified VSS and fasttrack multiparty computations with applications to threshold cryptography
    • Rosario Gennaro, Micheal O. Rabin, and Tal Rabin. Simplified VSS and fasttrack multiparty computations with applications to threshold cryptography. In Proceedings of 17th ACM PODC, 1998.118, 123, 124
    • (1998) Proceedings of 17Th ACM PODC
    • Gennaro, R.1    Rabin, M.O.2    Rabin, T.3
  • 16
  • 17
    • 23044524221 scopus 로고    scopus 로고
    • Efficient multi-party computation
    • Springer-Verlag, December
    • Martin Hirt, Ueli Maurer, and Bartosz Przydatek. Efficient multi-party computation. In ASIACRYPT 2000. Springer-Verlag, December 2000.118, 118, 119, 120
    • (2000) ASIACRYPT , pp. 2000
    • Hirt, M.1    Maurer, U.2    Przydatek, B.3
  • 18
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In Proceedings of 21st ACM STOC, pages 73–85, 1989.117
    • (1989) Proceedings of 21St ACM STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 19
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. CACM, 22:612–613, 1979.120
    • (1979) CACM , vol.22 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.