메뉴 건너뛰기




Volumn 1807, Issue , 2000, Pages 335-350

Minimal-latency secure function evaluation

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; CRYPTOGRAPHY;

EID: 84948952992     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45539-6_23     Document Type: Conference Paper
Times cited : (31)

References (25)
  • 1
    • 0024940038 scopus 로고
    • Non-Cryptographic Fault-Tolerant Computing in a Constant Expected Number of Rounds of Interaction
    • J. Bar-Ilan, D. Beaver. “Non-Cryptographic Fault-Tolerant Computing in a Constant Expected Number of Rounds of Interaction.” Proceedings of PODC, ACM, 1989, 201-209.
    • (1989) Proceedings of PODC, ACM , pp. 201-209
    • Bar-Ilan, J.1    Beaver, D.2
  • 2
    • 0009011118 scopus 로고
    • Bounded Width Polynomial Size Branching Programs Recognize Exactly those Languages in NC1
    • D. Barrington. “Bounded Width Polynomial Size Branching Programs Recognize Exactly those Languages in NC1.” Proceedings of the 18th STOC, ACM, 1986, 1-5.
    • (1986) Th STOC, ACM , pp. 1-5
    • Barrington, D.1
  • 3
    • 84933507780 scopus 로고
    • Efficient Multiparty Protocols Using Circuit Randomization
    • Springer-Verlag LNCS 576
    • D. Beaver. “Efficient Multiparty Protocols Using Circuit Randomization.” Advances in Cryptology - Crypto ’91 Proceedings, Springer-Verlag LNCS 576, 1992, 420-432.
    • (1992) Advances in Cryptology - Crypto ’91 Proceedings , pp. 420-432
    • Beaver, D.1
  • 4
    • 0025137207 scopus 로고
    • The Round Complexity of Secure Protocols
    • D. Beaver, S. Micali, P. Rogaway. “The Round Complexity of Secure Protocols.” Proceedings of the 22nd STOC, ACM, 1990, 503-513.
    • (1990) Nd STOC, ACM , pp. 503-513
    • Beaver, D.1    Micali, S.2    Rogaway, P.3
  • 5
    • 84880193265 scopus 로고
    • Computing Algebraic Formulas Using a Constant Number of Registers
    • M. Ben-Or, R. Cleve. “Computing Algebraic Formulas Using a Constant Number of Registers.” Proceedings of the 20th STOC, ACM, 1988, 254-257.
    • (1988) Th STOC, ACM , pp. 254-257
    • Ben-Or, M.1    Cleve, R.2
  • 6
    • 84898960610 scopus 로고
    • Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
    • M. Ben-Or, S. Goldwasser, A. Wigderson. “Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation.” Proceedings of the 20th STOC, ACM, 1988, 1-10.
    • (1988) Th STOC, ACM , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 7
    • 84898947315 scopus 로고
    • Multiparty Unconditionally Secure Protocols
    • D. Chaum, C. Crépeau, I. Damgaard. “Multiparty Unconditionally Secure Protocols.” Proceedings of the 20th STOC, ACM, 1988, 11-19.
    • (1988) Th STOC, ACM , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgaard, I.3
  • 8
    • 0002859474 scopus 로고
    • Multiparty Computations Ensuring Secrecy of Each Partys Input and Correctness of the Output
    • Springer-Verlag LNCS 293
    • D. Chaum, I. Damgard, J. van de Graaf. “Multiparty Computations Ensuring Secrecy of Each Party’s Input and Correctness of the Output.” Advances in Cryptology - Crypto ’87 Proceedings, Springer-Verlag LNCS 293, 1988.
    • (1988) Advances in Cryptology - Crypto ’87 Proceedings
    • Chaum, D.1    Damgard, I.2    Van De Graaf, J.3
  • 11
    • 33746337429 scopus 로고    scopus 로고
    • How to Prove Yourself: Practical Solutions to Identification and Signature Problems
    • A. Fiat, A. Shamir. “How to Prove Yourself: Practical Solutions to Identification and Signature Problems.” Proc. of Crypto ’86.
    • Proc. Of Crypto ’86
    • Fiat, A.1    Shamir, A.2
  • 12
    • 0024135240 scopus 로고
    • Zero Knowledge Proofs of Identity
    • U. Feige, A. Fiat, A. Shamir. “Zero Knowledge Proofs of Identity.” J. Cryptology 1: 2, 1988, 77-94.
    • (1988) J. Cryptology , vol.1 , Issue.2 , pp. 77-94
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 13
    • 0027986369 scopus 로고
    • A Minimal Model for Secure Computation
    • U. Feige, J. Kilian, M. Naor. “A Minimal Model for Secure Computation.” Proceedings of the 26th STOC, ACM, 1994, 554-563.
    • (1994) Th STOC, ACM , pp. 554-563
    • Feige, U.1    Kilian, J.2    Naor, M.3
  • 14
    • 0022914590 scopus 로고
    • Proofs that Yield Nothing but their Validity and a Methodology of Cryptographic Protocol Design
    • IEEE
    • O. Goldreich, S. Micali, A. Wigderson. “Proofs that Yield Nothing but their Validity and a Methodology of Cryptographic Protocol Design.” Proceedings of the 27th FOCS, IEEE, 1986. pages 174-187. IEEE, 1986.
    • (1986) Th FOCS, IEEE, 1986 , pp. 174-187
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 15
    • 0023545076 scopus 로고
    • How to Play Any Mental Game, or A Completeness Theorem for Protocols with Honest Majority
    • O. Goldreich, S. Micali, A. Wigderson. “How to Play Any Mental Game, or A Completeness Theorem for Protocols with Honest Majority.” Proceedings of the 19th STOC, ACM, 1987, 218-229.
    • (1987) Th STOC, ACM , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 16
    • 0021409284 scopus 로고    scopus 로고
    • Probabilistic Encryption
    • S. Goldwasser, S. Micali. Probabilistic Encryption. JCCS, 28: 2, 270-299, 1984.
    • JCCS , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 17
    • 84898989941 scopus 로고
    • Founding Cryptography on Oblivious Transfer
    • J. Kilian. “Founding Cryptography on Oblivious Transfer.” Proceedings of the 20th STOC, ACM, 1988, 20-29.
    • (1988) Th STOC, ACM , pp. 20-29
    • Kilian, J.1
  • 19
    • 40249087763 scopus 로고    scopus 로고
    • Number-Theoretic Consturctions of Efficient Pseudo-Random Functions
    • M. Naor, O. Reingold. “Number-Theoretic Consturctions of Efficient Pseudo-Random Functions.” Proceedings of the 38th FOCS, IEEE, 1997.
    • (1997) Th FOCS, IEEE
    • Naor, M.1    Reingold, O.2
  • 20
    • 77953754678 scopus 로고
    • How to Exchange Secrets by Oblivious Transfer
    • Harvard
    • M.O. Rabin. “How to Exchange Secrets by Oblivious Transfer.” TR-81, Harvard, 1981.
    • (1981) TR-81
    • Rabin, M.O.1
  • 21
    • 0033309271 scopus 로고    scopus 로고
    • Non-Interactive CryptoComputing for NC1
    • T. Sander, A. Young, M. Yung. “Non-Interactive CryptoComputing for NC1.” Proceedings of the 40th FOCS, IEEE, 1999.
    • (1999) Th FOCS, IEEE
    • Sander, T.1    Young, A.2    Yung, M.3
  • 22
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir. “How to Share a Secret.” Communications of the ACM, 22, 1979, 612-613.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 23
    • 0005044302 scopus 로고    scopus 로고
    • On the Security of ElGamal-based Encryption
    • Springer-Verlag
    • Y. Tsiounis, M. Yung. “On the Security of ElGamal-based Encryption.” Proceedings of PKC ’98, LNCS, Springer-Verlag, 1998.
    • (1998) Proceedings of PKC ’98, LNCS
    • Tsiounis, Y.1    Yung, M.2
  • 24
    • 0020312165 scopus 로고
    • Protocols for Secure Computations
    • A. Yao. “Protocols for Secure Computations.” Proceedings of the 23rd FOCS, IEEE, 1982, 160-164.
    • (1982) Rd FOCS, IEEE , pp. 160-164
    • Yao, A.1
  • 25
    • 0022882770 scopus 로고
    • How to Generate and Exchange Secrets
    • A. Yao. “How to Generate and Exchange Secrets.” Proceedings of the 27th FOCS, IEEE, 1986, 162-167.
    • (1986) Th FOCS, IEEE , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.