메뉴 건너뛰기




Volumn 1592, Issue , 1999, Pages 311-326

Efficient multiparty computations secure against an adaptive adversary

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY;

EID: 84957717648     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48910-X_22     Document Type: Conference Paper
Times cited : (167)

References (20)
  • 1
    • 33746365751 scopus 로고
    • Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
    • D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology, 4:75-122, 1991.
    • (1991) Journal of Cryptology , vol.4 , pp. 75-122
    • Beaver, D.1
  • 2
    • 84898960610 scopus 로고
    • Completeness theorems for noncryptographic fault-tolerant distributed computations
    • ACM
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic fault-tolerant distributed computations. In 20th STOC, pp. 1-10. ACM, 1988.
    • (1988) 20Th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 3
    • 85048601848 scopus 로고
    • Cryptographic protocols provably secure against dynamic dversaries
    • Springer LNCS
    • D. Beaver and S. Haber. Cryptographic protocols provably secure against dynamic dversaries. Eurocrypt '92, pp. 307-323. Springer LNCS 658, 1992.
    • (1992) Eurocrypt '92 , vol.658 , pp. 307-323
    • Beaver, D.1    Haber, S.2
  • 5
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols
    • ACM
    • D. Chaum, C. Crepeau, and I. Damgård. Multiparty unconditionally secure protocols. In 20th STOC, pp. 11-19. ACM, 1988.
    • (1988) 20Th STOC , pp. 11-19
    • Chaum, D.1    Crepeau, C.2    Damgård, I.3
  • 6
    • 0022199386 scopus 로고
    • Veriffiable secret sharing and achieving simultaneity in the presence of faults
    • IEEE
    • B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. Veriffiable secret sharing and achieving simultaneity in the presence of faults. In 26th FOCS, pp. 383-395. IEEE, 1985.
    • (1985) 26Th FOCS , pp. 383-395
    • Chor, B.1    Goldwasser, S.2    Micali, S.3    Awerbuch, B.4
  • 8
    • 0029723583 scopus 로고    scopus 로고
    • Adaptively secure multi-party computation
    • ACM
    • Ran Canetti, Uri Feige, Oded Goldreich, andMoni Naor. Adaptively secure multi-party computation. In 28th STOC, pp. 639-648. ACM, 1996.
    • (1996) 28Th STOC , pp. 639-648
    • Canetti, R.1    Feige, U.2    Goldreich, O.3    Naor, M.4
  • 9
    • 84894281582 scopus 로고
    • An optimal algorithm for synchronous Byzantine agreement
    • ACM
    • P. Feldman and S. Micali. An optimal algorithm for synchronous Byzantine agreement. In 20th STOC, pp. 148-161. ACM, 1988.
    • (1988) 20Th STOC , pp. 148-161
    • Feldman, P.1    Micali, S.2
  • 10
    • 84955564077 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • Springer LNCS
    • S. Goldwasser and L. Levin. Fair computation of general functions in presence of immoral majority. Crypto '90, pp. 77-93. Springer LNCS 537, 1990.
    • (1990) Crypto '90 , vol.537 , pp. 77-93
    • Goldwasser, S.1    Levin, L.2
  • 12
    • 0031628398 scopus 로고    scopus 로고
    • Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
    • ACM
    • R. Gennaro, M. Rabin, and T Rabin. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In 17th PODC, pp. 101-111. ACM, 1998.
    • (1998) 17Th PODC , pp. 101-111
    • Gennaro, R.1    Rabin, M.2    Rabin, T.3
  • 13
    • 0030693496 scopus 로고    scopus 로고
    • Complete characterization of adversaries tolerable in general multiparty computations
    • ACM
    • M. Hirt and U. Maurer. Complete characterization of adversaries tolerable in general multiparty computations. In 16th PODC, pp. 25-34. ACM, 1998.
    • (1998) 16Th PODC , pp. 25-34
    • Hirt, M.1    Maurer, U.2
  • 15
    • 84974655726 scopus 로고
    • Secure computation
    • Springer
    • S. Micali and P. Rogaway. Secure computation. Crypto '91, pp. 392-404. Springer LNCS 576, 1991.
    • (1991) Crypto '91 , vol.576 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 17
    • 0028542745 scopus 로고
    • Robust sharing of secrets when the dealer is honest or faulty
    • T. Rabin. Robust sharing of secrets when the dealer is honest or faulty. Journal of the ACM, 41(6):1089-1109, 1994.
    • (1994) Journal of the ACM , vol.41 , Issue.6 , pp. 1089-1109
    • Rabin, T.1
  • 18
    • 0024859552 scopus 로고
    • Veriffiable secret sharing and multiparty protocols with honest majority
    • ACM
    • T. Rabin and M. Ben-Or. Veriffiable secret sharing and multiparty protocols with honest majority. In 21st STOC, pp. 73-85. ACM, 1989.
    • (1989) 21St STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 20
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • IEEE
    • A.C. Yao. Protocols for secure computations. In 23rd FOCS, pp. 160-164. IEEE, 1982.
    • (1982) 23Rd FOCS , pp. 160-164
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.