메뉴 건너뛰기




Volumn 2015-June, Issue , 2015, Pages 949-953

Common randomness for secure computing

Author keywords

Common randomness; maximum common function; recoverability; secure computing; security

Indexed keywords

COMPUTABILITY AND DECIDABILITY; COMPUTATION THEORY; RANDOM PROCESSES;

EID: 84969779040     PISSN: 21578095     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2015.7282595     Document Type: Conference Paper
Times cited : (14)

References (23)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography-part i: Secret sharing
    • July
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-part i: Secret sharing, " IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, July 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 2
    • 85032862464 scopus 로고
    • Multiparty protocols tolerating half faulty processors
    • D. Beaver, "Multiparty protocols tolerating half faulty processors, " CRYPTO, LNCS, vol. 435, pp. 560-572, 1989.
    • (1989) CRYPTO, LNCS , vol.435 , pp. 560-572
    • Beaver, D.1
  • 3
    • 0003619771 scopus 로고
    • Perfect privacy for two party protocols
    • Harvard University
    • -, "Perfect privacy for two party protocols, " Technical Report TR-11-89, Harvard University, 1989.
    • (1989) Technical Report TR-11-89
    • Beaver, D.1
  • 4
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distribution computation
    • M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distribution computation, " STOC, pp. 1-10, 1988.
    • (1988) STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 5
    • 17744380057 scopus 로고
    • Coin flipping by telephone a protocol for solving impossible problems
    • Jan
    • M. Blum, "Coin flipping by telephone a protocol for solving impossible problems, " SIGACT News, vol. 15, no. 1, pp. 23-27, Jan 1983.
    • (1983) SIGACT News , vol.15 , Issue.1 , pp. 23-27
    • Blum, M.1
  • 6
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols
    • D. Chaum, C. Crépeau, and I. Damgård, "Multiparty unconditionally secure protocols, " STOC, pp. 11-19, 1988.
    • (1988) STOC , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgård, I.3
  • 7
    • 45249104852 scopus 로고    scopus 로고
    • Secrecy capacities for multiterminal channel models
    • June
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiterminal channel models, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2437-2452, June 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2437-2452
    • Csiszár, I.1    Narayan, P.2
  • 8
    • 84905389695 scopus 로고    scopus 로고
    • On the communication complexity of secure computation
    • D. Data, M. M. Prabhakaran, and V. M. Prabhakara, "On the communication complexity of secure computation, " CRYPTO, LNCS, vol. 8617, pp. 199-216, 2014.
    • (2014) CRYPTO, LNCS , vol.8617 , pp. 199-216
    • Data, D.1    Prabhakaran, M.M.2    Prabhakara, V.M.3
  • 9
    • 84957611040 scopus 로고    scopus 로고
    • Lower bound for oblivious transfer reductions
    • Y. Dodis and S. Micali, "Lower bound for oblivious transfer reductions, " EUROCRYPT, LNCS, vol. 1592, pp. 42-55, 1999.
    • (1999) EUROCRYPT, LNCS , vol.1592 , pp. 42-55
    • Dodis, Y.1    Micali, S.2
  • 10
    • 0006932810 scopus 로고
    • Common information is far less than mutual information
    • P. Gács and J. Körner, "Common information is far less than mutual information, " Problems of Control and Information Theory, vol. 2, no. 2, pp. 149-162, 1973.
    • (1973) Problems of Control and Information Theory , vol.2 , Issue.2 , pp. 149-162
    • Gács, P.1    Körner, J.2
  • 11
    • 0002365530 scopus 로고
    • Privacy and communication complexity
    • E. Kushilevitz, "Privacy and communication complexity, " SIAM Journal on Math, vol. 5, no. 2, pp. 273-284, 1992.
    • (1992) SIAM Journal on Math , vol.5 , Issue.2 , pp. 273-284
    • Kushilevitz, E.1
  • 12
    • 77957602848 scopus 로고    scopus 로고
    • Information inequalities for joint distributions, with interpretations and applications
    • June
    • M. Madiman and P. Tetali, "Information inequalities for joint distributions, with interpretations and applications, " IEEE Trans. Inf. Theory, vol. 56, no. 6, pp. 2699-2713, June 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.6 , pp. 2699-2713
    • Madiman, M.1    Tetali, P.2
  • 13
    • 70350679063 scopus 로고    scopus 로고
    • Complexity of multiparty computation problems: The case of 2-party symmetric secure function evaluation
    • H. K. Maji, M. Prabhakaran, and M. Rosulek, "Complexity of multiparty computation problems: The case of 2-party symmetric secure function evaluation, " TCC, LNCS, vol. 5444, pp. 256-273, 2009.
    • (2009) TCC, LNCS , vol.5444 , pp. 256-273
    • Maji, H.K.1    Prabhakaran, M.2    Rosulek, M.3
  • 14
    • 84871588526 scopus 로고    scopus 로고
    • A unified characterization of completeness and triviality for secure function evaluation
    • -, "A unified characterization of completeness and triviality for secure function evaluation, " INDOCRYPTO, LNCS, vol. 7668, pp. 40-59, 2012.
    • (2012) INDOCRYPTO, LNCS , vol.7668 , pp. 40-59
    • Maji, H.K.1    Prabhakaran, M.2    Rosulek, M.3
  • 15
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information, " IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 17
    • 84901268112 scopus 로고    scopus 로고
    • Assisted common information with an application to secure twoparty samplign
    • June
    • -, "Assisted common information with an application to secure twoparty samplign, " IEEE Trans. Inf. Theory, vol. 60, no. 6, pp. 3413-3434, June 2014.
    • (2014) IEEE Trans. Inf. Theory , vol.60 , Issue.6 , pp. 3413-3434
    • Prabhakaran, V.M.1    Prabhakaran, M.M.2
  • 19
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • T. Rabin and M. Ben-Or, "Verifiable secret sharing and multiparty protocols with honest majority, " STOC, pp. 73-85, 1989.
    • (1989) STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 20
    • 80053961199 scopus 로고    scopus 로고
    • When is a function securely computable
    • October
    • H. Tyagi, P. Narayan, and P. Gupta, "When is a function securely computable" IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6337-6350, October 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.10 , pp. 6337-6350
    • Tyagi, H.1    Narayan, P.2    Gupta, P.3
  • 22
    • 45249110618 scopus 로고    scopus 로고
    • New monotones and lower bounds in unconditional two-party computation
    • June
    • S. Wolf and J. Wullschleger, "New monotones and lower bounds in unconditional two-party computation, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2792-2797, June 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2792-2797
    • Wolf, S.1    Wullschleger, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.