메뉴 건너뛰기




Volumn 1880, Issue , 2000, Pages 74-92

Parallel reducibility for information-theoretically secure computation

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 84974597111     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44598-6_5     Document Type: Conference Paper
Times cited : (33)

References (17)
  • 1
    • 0002382799 scopus 로고
    • Foundations of Secure Interactive Computing
    • D. Beaver, Foundations of Secure Interactive Computing. Proc. Of CRYPTO’91, pp. 377-391, 1991.
    • (1991) Proc. Of CRYPTO’91 , pp. 377-391
    • Beaver, D.1
  • 2
    • 33746365751 scopus 로고
    • Secure multi-party protocols and zero-knowledge proof systems tolerating a faulty majority
    • D. Beaver, Secure multi-party protocols and zero-knowledge proof systems tolerating a faulty majority. Journal of Cryptology, 4(2), pp. 75-122, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.2 , pp. 75-122
    • Beaver, D.1
  • 3
    • 0024769014 scopus 로고
    • Multi-party computation with faulty majority
    • D. Beaver and S. Goldwasser, Multi-party computation with faulty majority, Proc. Of the 30th FOCS, pp. 468-473, 1989.
    • (1989) Proc. Of the 30Th FOCS , pp. 468-473
    • Beaver, D.1    Goldwasser, S.2
  • 4
    • 84898960610 scopus 로고    scopus 로고
    • Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
    • M. Ben-Or, S. Goldwasser and A. Wigderson, Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation, Proc. Of the 20th STOC, pp. 1-10, 1998.
    • (1998) Proc. Of the 20Th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 5
    • 0000731055 scopus 로고    scopus 로고
    • Security and Composition of Multi-party Cryptographic Protocols
    • R. Canetti, Security and Composition of Multi-party Cryptographic Protocols. Journal of Cryptology, 13(1):143-202.
    • Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 8
    • 84948975649 scopus 로고    scopus 로고
    • General secure multiparty computation from any linear secret-sharing scheme
    • R. Cramer, U. Maurer, and I. Damgård, General secure multiparty computation from any linear secret-sharing scheme, Proc. EUROCRYPT’00, pp. 316-334, 2000.
    • (2000) Proc. EUROCRYPT’00 , pp. 316-334
    • Cramer, R.1    Maurer, U.2    Damgård, I.3
  • 10
    • 0031210863 scopus 로고    scopus 로고
    • Optimal algorithms for Byzantine agreement
    • P. Feldman and S. Micali, Optimal algorithms for Byzantine agreement, SIAM J. On Computing, 26(4):873-933, 1997.
    • (1997) SIAM J. On Computing , vol.26 , Issue.4 , pp. 873-933
    • Feldman, P.1    Micali, S.2
  • 11
    • 33747194089 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • S. Goldwasser and L. Levin, Fair computation of general functions in presence of immoral majority, Proc. CRYPTO ’90, pp. 75-84, 1990.
    • (1990) Proc. CRYPTO ’90 , pp. 75-84
    • Goldwasser, S.1    Levin, L.2
  • 15
    • 0002187139 scopus 로고
    • Secure computation
    • Also in Workshop On Multi-Party Secure Computation, Weizmann Institute, Israel, 1998
    • S. Micali and P. Rogaway, Secure computation, Proc. CRYPTO ’91, pp. 392-404, 1991. Also in Workshop On Multi-Party Secure Computation, Weizmann Institute, Israel, 1998.
    • (1991) Proc. CRYPTO ’91 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 16
    • 84974565779 scopus 로고
    • Verifiable Secret Sharing and Multi-party Protocols with Honest Majority
    • T. Rabin and M. Ben-Or, Verifiable Secret Sharing and Multi-party Protocols with Honest Majority, Proc. Of 21st STOC, pp. 75-83, 1989.
    • (1989) Proc. Of 21St STOC , pp. 75-83
    • Rabin, T.1    Ben-Or, M.2
  • 17
    • 0020312165 scopus 로고
    • Protocols for secure computation
    • A. Yao, Protocols for secure computation, Proc. Of the 23rd FOCS, pp. 160-164, 1982.
    • (1982) Proc. Of the 23Rd FOCS , pp. 160-164
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.