메뉴 건너뛰기




Volumn 8349 LNAI, Issue , 2014, Pages 317-342

On the cryptographic complexity of the worst functions

Author keywords

[No Author keywords available]

Indexed keywords

RANDOM PROCESSES;

EID: 84958544842     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-54242-8_14     Document Type: Conference Paper
Times cited : (64)

References (58)
  • 1
    • 27644557351 scopus 로고    scopus 로고
    • Computationally private randomizing polynomials and their applications
    • Applebaum, B., Ishai, Y., Kushilevitz, E.: Computationally private randomizing polynomials and their applications. In: CCC, pp. 260-274 (2005)
    • (2005) CCC , pp. 260-274
    • Applebaum, B.1    Ishai, Y.2    Kushilevitz, E.3
  • 2
    • 38049039951 scopus 로고    scopus 로고
    • On locally decodable codes, self-correctable codes, and t-private PIR
    • Charikar, M., Jansen, K., Reingold, O., Rolim, J.D.P. (eds.) APPROX and RANDOM 2007 Springer, Heidelberg
    • Barkol, O., Ishai, Y., Weinreb, E.: On locally decodable codes, self-correctable codes, and t-private PIR. In: Charikar, M., Jansen, K., Reingold, O., Rolim, J.D.P. (eds.) APPROX and RANDOM 2007. LNCS, vol. 4627, pp. 311-325. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4627 , pp. 311-325
    • Barkol, O.1    Ishai, Y.2    Weinreb, E.3
  • 3
    • 0029702967 scopus 로고    scopus 로고
    • Correlated pseudorandomness and the complexity of private computations
    • Beaver, D.: Correlated pseudorandomness and the complexity of private computations. In: STOC, pp. 479-488 (1996)
    • (1996) STOC , pp. 479-488
    • Beaver, D.1
  • 4
    • 84928743703 scopus 로고
    • Precomputing oblivious transfer
    • Coppersmith, D. (ed.) CRYPTO 1995 Springer, Heidelberg
    • Beaver, D.: Precomputing oblivious transfer. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 97-109. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.963 , pp. 97-109
    • Beaver, D.1
  • 5
    • 84979502594 scopus 로고
    • Security with low communication overhead
    • Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990 Springer, Heidelberg
    • Beaver, D., Feigenbaum, J., Kilian, J., Rogaway, P.: Security with low communication overhead. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 62-76. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.537 , pp. 62-76
    • Beaver, D.1    Feigenbaum, J.2    Kilian, J.3    Rogaway, P.4
  • 7
    • 0029513522 scopus 로고
    • Lower bounds on monotone span programs
    • Beimel, A., Gal, A., Paterson, M.: Lower bounds on monotone span programs. In: FOCS, pp. 674-681 (1995)
    • (1995) FOCS , pp. 674-681
    • Beimel, A.1    Gal, A.2    Paterson, M.3
  • 8
    • 84865527639 scopus 로고    scopus 로고
    • Secret sharing for very dense graphs
    • Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012 Springer, Heidelberg
    • Beimel, A., Farr̀as, O., Mintz, Y.: Secret sharing for very dense graphs. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 144-161. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7417 , pp. 144-161
    • Beimel, A.1    Farr̀as, O.2    Mintz, Y.3
  • 9
    • 0034865642 scopus 로고    scopus 로고
    • On the power of nonlinear secret sharing
    • Beimel, A., Ishai, Y.: On the power of nonlinear secret sharing. In: CCC, pp. 188-202 (2001)
    • (2001) CCC , pp. 188-202
    • Beimel, A.1    Ishai, Y.2
  • 10
    • 21144453606 scopus 로고    scopus 로고
    • General constructions for informationtheoretic private information retrieval
    • Beimel, A., Ishai, Y., Kushilevitz, E.: General constructions for informationtheoretic private information retrieval. Jour. Comput. Syst. & Sci. 71(2), 213-247 (2005)
    • (2005) Jour. Comput. Syst. & Sci. , vol.71 , Issue.2 , pp. 213-247
    • Beimel, A.1    Ishai, Y.2    Kushilevitz, E.3
  • 11
    • 84866508151 scopus 로고    scopus 로고
    • Share conversion and private information retrieval
    • Beimel, A., Ishai, Y., Kushilevitz, E., Orlov, I.: Share conversion and private information retrieval. In: CCC, pp. 258-268 (2012)
    • (2012) CCC , pp. 258-268
    • Beimel, A.1    Ishai, Y.2    Kushilevitz, E.3    Orlov, I.4
  • 12
    • 35048856983 scopus 로고    scopus 로고
    • A quantitative approach to reductions in secure computation
    • Naor, M. (ed.) TCC 2004 Springer, Heidelberg
    • Beimel, A., Malkin, T.: A quantitative approach to reductions in secure computation. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 238-257. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2951 , pp. 238-257
    • Beimel, A.1    Malkin, T.2
  • 13
    • 84898960610 scopus 로고
    • Completeness theorems for noncryptographic fault-tolerant distributed computations
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computations. In: STOC, pp. 1-10 (1988)
    • (1988) STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 14
    • 79958004492 scopus 로고    scopus 로고
    • Semi-homomorphic encryption and multiparty computation
    • Paterson, K.G. (ed.) EUROCRYPT 2011 Springer, Heidelberg
    • Bendlin, R., Damgrard, I., Orlandi, C., Zakarias, S.: Semi-homomorphic encryption and multiparty computation. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 169-188. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6632 , pp. 169-188
    • Bendlin, R.1    Damgrard, I.2    Orlandi, C.3    Zakarias, S.4
  • 17
    • 0022864717 scopus 로고
    • Information theoretic reduction among disclosure problems
    • Brassard, G., Crepeau, C., Robert, J.-M.: Information theoretic reduction among disclosure problems. In: FOCS, pp. 168-173 (1986)
    • (1986) FOCS , pp. 168-173
    • Brassard, G.1    Crepeau, C.2    Robert, J.-M.3
  • 18
    • 0022895407 scopus 로고
    • Decomposition of graphs and monotone formula size of homogeneous functions
    • Bublitz, S.: Decomposition of graphs and monotone formula size of homogeneous functions. In: Acta Informatica, pp. 689-696 (1986)
    • (1986) Acta Informatica , pp. 689-696
    • Bublitz, S.1
  • 19
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols
    • Chaum, D., Cŕepeau, C., Damgard, I.: Multiparty unconditionally secure protocols. In: STOC, pp. 11-19 (1988)
    • (1988) STOC , pp. 11-19
    • Chaum, D.1    Cŕepeau, C.2    Damgard, I.3
  • 20
    • 80053413438 scopus 로고    scopus 로고
    • Partial derivatives in arithmetic complexity and beyond
    • Chen, X., Kayal, N., Wigderson, A.: Partial derivatives in arithmetic complexity and beyond. In: FSTTCS, pp. 1-138 (2011)
    • (2011) FSTTCS , pp. 1-138
    • Chen, X.1    Kayal, N.2    Wigderson, A.3
  • 22
    • 0024132071 scopus 로고
    • Achieving oblivious transfer using weakened security assumptions (extended abstract)
    • Crepeau, C., Kilian, J.: Achieving oblivious transfer using weakened security assumptions (extended abstract). In: FOCS, pp. 42-52 (1988)
    • (1988) FOCS , pp. 42-52
    • Crepeau, C.1    Kilian, J.2
  • 24
    • 84873966735 scopus 로고    scopus 로고
    • Constant-overhead secure computation of boolean circuits using preprocessing
    • Sahai, A. (ed.) TCC 2013 Springer, Heidelberg
    • Damgrard, I., Zakarias, S.: Constant-overhead secure computation of boolean circuits using preprocessing. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 621-641. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7785 , pp. 621-641
    • Damgrard, I.1    Zakarias, S.2
  • 25
    • 84974597111 scopus 로고    scopus 로고
    • Parallel reducibility for information-theoretically secure computation
    • Bellare, M. (ed.) CRYPTO 2000 Springer, Heidelberg
    • Dodis, Y., Micali, S.: Parallel reducibility for information- theoretically secure computation. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 74-92. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 74-92
    • Dodis, Y.1    Micali, S.2
  • 26
    • 78751499873 scopus 로고    scopus 로고
    • Matching vector codes
    • Dvir, Z., Gopalan, P., Yekhanin, S.: Matching vector codes. In: FOCS, pp. 705-714 (2010)
    • (2010) FOCS , pp. 705-714
    • Dvir, Z.1    Gopalan, P.2    Yekhanin, S.3
  • 27
    • 70350642094 scopus 로고    scopus 로고
    • 3-query locally decodable codes of subexponential length
    • Efremenko, K.: 3-query locally decodable codes of subexponential length. In: STOC, pp. 39-44 (2009)
    • (2009) STOC , pp. 39-44
    • Efremenko, K.1
  • 28
    • 0041135073 scopus 로고    scopus 로고
    • Covering a graph by complete bipartite graphs
    • Erdos, P., Pyber, L.: Covering a graph by complete bipartite graphs. In: Discrete Mathematics, pp. 249-251 (1997)
    • (1997) Discrete Mathematics , pp. 249-251
    • Erdos, P.1    Pyber, L.2
  • 29
    • 0020878801 scopus 로고
    • A randomized protocol for signing contracts
    • Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. In: Crypto, pp. 205-210 (1983)
    • (1983) Crypto , pp. 205-210
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 30
    • 0027986369 scopus 로고
    • A minimal model for secure computation (extended abstract)
    • Feige, U., Kilian, J., Naor, M.: A minimal model for secure computation (extended abstract). In: STOC, pp. 554-563 (1994)
    • (1994) STOC , pp. 554-563
    • Feige, U.1    Kilian, J.2    Naor, M.3
  • 32
    • 0023545076 scopus 로고
    • How to play any mental game, or a completeness theorem for protocols with honest majority
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game, or a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229 (1987)
    • (1987) STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 33
    • 85032194875 scopus 로고
    • How to solve any protocol problem-an efficiency improvement
    • Pomerance, C. (ed.) CRYPTO 1987 Springer, Heidelberg
    • Goldreich, O., Vainish, R.: How to solve any protocol problem-an efficiency improvement. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 73-86. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 73-86
    • Goldreich, O.1    Vainish, R.2
  • 34
    • 38049107215 scopus 로고    scopus 로고
    • How many oblivious transfers are needed for secure multiparty computation?
    • Menezes, A. (ed.) CRYPTO 2007 Springer, Heidelberg
    • Harnik, D., Ishai, Y., Kushilevitz, E.: How many oblivious transfers are needed for secure multiparty computation? In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 284-302. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 284-302
    • Harnik, D.1    Ishai, Y.2    Kushilevitz, E.3
  • 35
    • 40249091385 scopus 로고    scopus 로고
    • OT-combiners via secure computation
    • Canetti, R. (ed.) TCC 2008 Springer, Heidelberg
    • Harnik, D., Ishai, Y., Kushilevitz, E., Nielsen, J.B.: OT-combiners via secure computation. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 393-411. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4948 , pp. 393-411
    • Harnik, D.1    Ishai, Y.2    Kushilevitz, E.3    Nielsen, J.B.4
  • 36
    • 84894276932 scopus 로고    scopus 로고
    • Randomization techniques for secure computation
    • Prabhakaran, M., Sahai, A. (eds.)
    • Ishai, Y.: Randomization techniques for secure computation. In: Prabhakaran, M., Sahai, A. (eds.) Secure Multi-Party Computation (2013)
    • (2013) Secure Multi-Party Computation
    • Ishai, Y.1
  • 37
    • 24144457853 scopus 로고    scopus 로고
    • Extending oblivious transfers efficiently
    • Boneh, D. (ed.) CRYPTO 2003 Springer, Heidelberg
    • Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 145-161
    • Ishai, Y.1    Kilian, J.2    Nissim, K.3    Petrank, E.4
  • 38
    • 0030718794 scopus 로고    scopus 로고
    • Private simultaneous messages protocols with applications
    • Ishai, Y., Kushilevitz, E.: Private simultaneous messages protocols with applications. In: ISTCS, pp. 174-184 (1997)
    • (1997) ISTCS , pp. 174-184
    • Ishai, Y.1    Kushilevitz, E.2
  • 39
    • 0034507841 scopus 로고    scopus 로고
    • Randomizing polynomials: A new representation with applications to round-efficient secure computation
    • Ishai, Y., Kushilevitz, E.: Randomizing polynomials: A new representation with applications to round-efficient secure computation. In: FOCS, pp. 294-304 (2000)
    • (2000) FOCS , pp. 294-304
    • Ishai, Y.1    Kushilevitz, E.2
  • 40
    • 33748114725 scopus 로고    scopus 로고
    • On the hardness of information-theoretic multiparty computation
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004 Springer, Heidelberg
    • Ishai, Y., Kushilevitz, E.: On the hardness of information-theoretic multiparty computation. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 439-455. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 439-455
    • Ishai, Y.1    Kushilevitz, E.2
  • 41
    • 84873953976 scopus 로고    scopus 로고
    • On the power of correlated randomness in secure computation
    • Sahai, A. (ed.) TCC 2013 Springer, Heidelberg
    • Ishai, Y., Kushilevitz, E., Meldgaard, S., Orlandi, C., Paskin-Cherniavsky, A.: On the power of correlated randomness in secure computation. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 600-620. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7785 , pp. 600-620
    • Ishai, Y.1    Kushilevitz, E.2    Meldgaard, S.3    Orlandi, C.4    Paskin-Cherniavsky, A.5
  • 43
    • 51849102397 scopus 로고    scopus 로고
    • Founding cryptography on oblivious transfer-efficiently
    • Wagner, D. (ed.) CRYPTO 2008 Springer, Heidelberg
    • Ishai, Y., Prabhakaran, M., Sahai, A.: Founding cryptography on oblivious transfer-efficiently. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 572-591. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 572-591
    • Ishai, Y.1    Prabhakaran, M.2    Sahai, A.3
  • 44
    • 84880249454 scopus 로고    scopus 로고
    • Non-local box complexity and secure function evaluation
    • Kaplan, M., Kerenidis, I., Laplante, S., Roland, J.: Non-local box complexity and secure function evaluation. In: FSTTCS, pp. 239-250 (2009)
    • (2009) FSTTCS , pp. 239-250
    • Kaplan, M.1    Kerenidis, I.2    Laplante, S.3    Roland, J.4
  • 45
    • 84898989941 scopus 로고
    • Founding cryptography on oblivious transfer
    • Kilian, J.: Founding cryptography on oblivious transfer. In: STOC, pp. 20-31 (1988)
    • (1988) STOC , pp. 20-31
    • Kilian, J.1
  • 46
    • 0033706604 scopus 로고    scopus 로고
    • More general completeness theorems for secure two-party computation
    • Kilian, J.: More general completeness theorems for secure two-party computation. In: STOC, pp. 316-324 (2000)
    • (2000) STOC , pp. 316-324
    • Kilian, J.1
  • 47
    • 33646813314 scopus 로고    scopus 로고
    • Gate evaluation secret sharing and secure one-round two-party computation
    • Roy, B. (ed.) ASIACRYPT 2005 Springer, Heidelberg
    • Kolesnikov, V.: Gate evaluation secret sharing and secure one-round two-party computation. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 136-155. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 136-155
    • Kolesnikov, V.1
  • 52
  • 53
    • 84938487169 scopus 로고
    • The synthesis of two-terminal switching circuits
    • Shannon C.
    • Shannon, C.: The synthesis of two-terminal switching circuits. Bell System Technical Journal, 59-98 (1949)
    • (1949) Bell System Technical Journal , pp. 59-98
  • 54
    • 0031362824 scopus 로고    scopus 로고
    • Secret sharing in graph-based prohibited structures
    • Sun, H., Shieh, S.: Secret sharing in graph-based prohibited structures. In: INFOCOM, pp. 718-724 (1997)
    • (1997) INFOCOM , pp. 718-724
    • Sun, H.1    Shieh, S.2
  • 55
    • 0001522694 scopus 로고
    • On the information rate of perfect secret sharing schemes
    • van Dijk, M.: On the information rate of perfect secret sharing schemes. In: Designs, Codes and Cryptography, pp. 143-169 (1995)
    • (1995) Designs, Codes and Cryptography , pp. 143-169
    • Van Dijk, M.1
  • 56
    • 77956992510 scopus 로고    scopus 로고
    • On the efficiency of classical and quantum oblivious transfer reductions
    • Rabin, T. (ed.) CRYPTO 2010 Springer, Heidelberg
    • Winkler, S., Wullschleger, J.: On the efficiency of classical and quantum oblivious transfer reductions. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 707-723. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 707-723
    • Winkler, S.1    Wullschleger, J.2
  • 57
    • 40549129517 scopus 로고    scopus 로고
    • A geometric approach to information-theoretic private information retrieval
    • Woodruff, D., Yekhanin, S.: A geometric approach to information-theoretic private information retrieval. SIAM J. Comp. 37(4), 1046-1056 (2007)
    • (2007) SIAM J. Comp. , vol.37 , Issue.4 , pp. 1046-1056
    • Woodruff, D.1    Yekhanin, S.2
  • 58
    • 34648841198 scopus 로고    scopus 로고
    • Towards 3-query locally decodable codes of subexponential length
    • Yekhanin, S.: Towards 3-query locally decodable codes of subexponential length. In: STOC, pp. 266-274 (2007)
    • (2007) STOC , pp. 266-274
    • Yekhanin, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.