메뉴 건너뛰기




Volumn 576 LNCS, Issue , 1992, Pages 392-404

Secure computation

Author keywords

[No Author keywords available]

Indexed keywords

BLENDING; COMPUTATION THEORY;

EID: 84974655726     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-46766-1_32     Document Type: Conference Paper
Times cited : (226)

References (50)
  • 1
    • 85029469140 scopus 로고
    • Formal Definitions for Secure Distributed Protocols
    • October, (Paper not presented at workshop but invited to appear in proceedings.)
    • D. Beaver, “Formal Definitions for Secure Distributed Protocols,” in Distributed Computing and Cryptography - Proceedings of a DIMACS Workshop, October 1989. (Paper not presented at workshop but invited to appear in proceedings.)
    • (1989) Distributed Computing and Cryptography - Proceedings of a DIMACS Workshop
    • Beaver, D.1
  • 3
    • 0024769014 scopus 로고
    • Multiparty Computations with Faulty Majority
    • D. Beaver and S. Goldwasser, “Multiparty Computations with Faulty Majority,” Proc. of the 30th FOCS (1989), 468-473.
    • (1989) Proc. of the 30th FOCS , pp. 468-473
    • Beaver, D.1    Goldwasser, S.2
  • 5
    • 49949117411 scopus 로고
    • A Robust and Verifiable Cryptographically Secure Election Scheme
    • J. Benaloh (Cohen) and M. Fischer, “A Robust and Verifiable Cryptographically Secure Election Scheme,” Proc. of the 26th FOCS (1985), 372-381.
    • (1985) Proc. of the 26th FOCS , pp. 372-381
    • Benaloh Cohen, J.1    Fischer, M.2
  • 6
    • 84898960610 scopus 로고
    • Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
    • M. Ben-Or, S. Goldwasser and A. Wigderson, “Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation,” Proc. of the 20th STOC (1988), 1-10.
    • (1988) Proc. of the 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 8
    • 0021522644 scopus 로고
    • How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits
    • Earlier version in Proc. of the 23rd FOCS (1982)
    • M. Blum and S. Micali, “How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits,” SIAM J. of Computing, Vol. 13, No. 4, 1984, 850-864. Earlier version in Proc. of the 23rd FOCS (1982).
    • (1984) SIAM J. of Computing , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 9
    • 0019532104 scopus 로고
    • Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
    • February
    • D. Chaum. “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,” Comm. of the ACM 24(2) February 1981, 84-88.
    • (1981) Comm. of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 12
    • 84864708144 scopus 로고    scopus 로고
    • Multiparty Computations Ensuring the Privacy of Each Party’s Input and Correctness of the Result
    • D. Chaum, I. Damgård and J. van de Graff, “Multiparty Computations Ensuring the Privacy of Each Party’s Input and Correctness of the Result,” CRYPTO-87 Proceedings, 87-119.
    • CRYPTO-87 Proceedings , pp. 87-119
    • Chaum, D.1    Damgård, I.2    Van De Graff, J.3
  • 14
    • 11744265658 scopus 로고
    • Private Computations over the Integers
    • Earlier version by Chor and Kushilevitz, “Sharing over Infinite Domains,” CRYPTO-89 Proceedings, Springer-Verlag, 299-306
    • B. Chor, M. Geréb-Graus and E. Kushilevitz, “Private Computations over the Integers,” Proc. of the 31st FOCS (1990), 325-344. Earlier version by Chor and Kushilevitz, “Sharing over Infinite Domains,” CRYPTO-89 Proceedings, Springer-Verlag, 299-306.
    • (1990) Proc. of the 31st FOCS , pp. 325-344
    • Chor, B.1    Geréb-Graus, M.2    Kushilevitz, E.3
  • 15
    • 0022199386 scopus 로고
    • Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults
    • B. Chor, O. Goldwasser, S. Micali and B. Awerbuch, “Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults,” Proc. of the 26th FOCS (1985), 383-95.
    • (1985) Proc. of the 26th FOCS , pp. 383-395
    • Chor, B.1    Goldwasser, O.2    Micali, S.3    Awerbuch, B.4
  • 19
    • 0000927535 scopus 로고
    • Paths, Trees, and Flowers
    • J. Edmonds, “Paths, Trees, and Flowers,” Canadian J. of Mathematics, 17: 449-467, 1965.
    • (1965) Canadian J. of Mathematics , vol.17 , pp. 449-467
    • Edmonds, J.1
  • 21
    • 0024984004 scopus 로고
    • Witness indistinguishability and witness hiding protocols
    • U. Feige and A. Shamir, “Witness indistinguishability and witness hiding protocols,” Proc. of the 22nd STOC (1990), 416-426.
    • (1990) Proc. of the 22nd STOC , pp. 416-426
    • Feige, U.1    Shamir, A.2
  • 24
    • 84894281582 scopus 로고
    • An Optimal Algorithms for Synchronous Byzantine Agreement
    • MIT/LCS Technical Report TM-425 (June 1990)
    • P. Feldman and S. Micali, “An Optimal Algorithms for Synchronous Byzantine Agreement,” MIT/LCS Technical Report TM-425 (June 1990). Previous version in Proc. of the 20th STOC (1988), 148-161.
    • (1988) Previous version in Proc. of the 20th STOC , pp. 148-161
    • Feldman, P.1    Micali, S.2
  • 25
    • 84976655650 scopus 로고    scopus 로고
    • Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model
    • Z. Galil, S. Haber and M. Yung, “Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model,” CRYPTO-87 Proceedings, 135-155.
    • CRYPTO-87 Proceedings , pp. 135-155
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 27
    • 33747194089 scopus 로고    scopus 로고
    • Fair Computation of General Functions in Presence of Immoral Majority
    • S. Goldwasser and L. Levin, “Fair Computation of General Functions in Presence of Immoral Majority,” CRYPTO-90 Proceedings, 75-84.
    • CRYPTO-90 Proceedings , pp. 75-84
    • Goldwasser, S.1    Levin, L.2
  • 28
    • 0021409284 scopus 로고
    • Probabilistic Encryption
    • Earlier version in Proc. of the 14th STOC (1982)
    • S. Goldwasser and S. Micali, “Probabilistic Encryption,” Journal of Computer and System Sciences, Vol. 28, No. 2 (1984), 270-299. Earlier version in Proc. of the 14th STOC (1982).
    • (1984) Journal of Computer and System Sciences , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 29
    • 0024611659 scopus 로고
    • The Knowledge Complexity of Interactive Proof Systems
    • (February, Earlier version in Proc. of the 17th STOC (1985), 291-305
    • O. Goldwasser, S. Micali, and C. Rackoff, “The Knowledge Complexity of Interactive Proof Systems,” SIAM J. of Comp., Vol. 18, No. 1, 186-208 (February 1989). Earlier version in Proc. of the 17th STOC (1985), 291-305.
    • (1989) SIAM J. of Comp , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, O.1    Micali, S.2    Rackoff, C.3
  • 30
    • 0023985465 scopus 로고
    • A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
    • April
    • S. Goldwasser, S. Micali, and R. Rivest, “A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks,” SIAM Journal on Computing, 17(2): 281-308, April 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 32
    • 0141653334 scopus 로고    scopus 로고
    • How to Solve any Protocol Problem-An Efficiency Improvement
    • O. Goldreich and R. Vainish, “How to Solve any Protocol Problem-An Efficiency Improvement,” CRYPTO-87 Proceedings, 76-86.
    • CRYPTO-87 Proceedings , pp. 76-86
    • Goldreich, O.1    Vainish, R.2
  • 33
    • 35248878310 scopus 로고
    • Multi-Party Cryptographic Computation: Techniques and Applications
    • Ph.D. Thesis
    • S. Haber, “Multi-Party Cryptographic Computation: Techniques and Applications,” Columbia University Ph.D. Thesis (1988).
    • (1988) Columbia University
    • Haber, S.1
  • 37
    • 51249173191 scopus 로고
    • One-Way Functions and Pseudorandom Generators
    • Earlier version in Proc. of the 17th STOC (1985)
    • L. Levin, “One-Way Functions and Pseudorandom Generators,” Combinatorica, Vol. 17, 1988, 357-363. Earlier version in Proc. of the 17th STOC (1985).
    • (1988) Combinatorica , vol.17 , pp. 357-363
    • Levin, L.1
  • 38
    • 0020889143 scopus 로고
    • How to Simultaneously Exchange a Secret Bit by Flipping a Symmetrically Biased Coin
    • M. Luby, S. Micali and C. Rackoff, “How to Simultaneously Exchange a Secret Bit by Flipping a Symmetrically Biased Coin,” Proc of the 24th FOCS (1983).
    • (1983) Proc of the 24th FOCS
    • Luby, M.1    Micali, S.2    Rackoff, C.3
  • 40
    • 0023985474 scopus 로고
    • The Notion of Security for Probabilistic Cryptosystems
    • April
    • S. Micali, C. Rackoff and B. Sloan, “The Notion of Security for Probabilistic Cryptosystems,” SIAM J. of Computing, 17(2): 412-26, April 1988.
    • (1988) SIAM J. of Computing , vol.17 , Issue.2 , pp. 412-426
    • Micali, S.1    Rackoff, C.2    Sloan, B.3
  • 42
    • 0023601199 scopus 로고
    • On the Cunning Power of Cheating Verifiers: Some Observations about Zero Knowledge Proofs
    • Y. Oren, “On the Cunning Power of Cheating Verifiers: Some Observations about Zero Knowledge Proofs,” Proc. of the 28th FOCS (1987), 462-471.
    • (1987) Proc. of the 28th FOCS , pp. 462-471
    • Oren, Y.1
  • 43
    • 84976810569 scopus 로고
    • Reaching Agreement in the Presence of Faults
    • M. Pease, R. Shostak and L. Lamport, “Reaching Agreement in the Presence of Faults,” J. of the ACM Vol. 27, No. 2, 1980.
    • (1980) J. of the ACM , vol.27 , Issue.2
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 44
    • 0003462641 scopus 로고
    • How to Exchange Secrets by Oblivious Transfer
    • Aiken Computation Laboratory, Harvard University
    • M. Rabin, “How to Exchange Secrets by Oblivious Transfer,” Technical Memo TR-81, Aiken Computation Laboratory, Harvard University, 1981.
    • (1981) Technical Memo TR-81
    • Rabin, M.1
  • 45
    • 0024859552 scopus 로고
    • Verifiable Secret Sharing and Multiparty Protocols with Honest Majority
    • T. Rabin and M. Ben-Or, “Verifiable Secret Sharing and Multiparty Protocols with Honest Majority,” Proc. of the 21st STOC (1989), 73-85.
    • (1989) Proc. of the 21st STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 46
    • 3042680831 scopus 로고
    • Mental Poker
    • D. D. Klarner, editor, Wadsworth International
    • A. Shamir, R. Rivest, and L. Adleman, “Mental Poker,” in Mathematical Gardener, D. D. Klarner, editor, Wadsworth International (1981) pp 37-43.
    • (1981) Mathematical Gardener , pp. 37-43
    • Shamir, A.1    Rivest, R.2    Adleman, L.3
  • 47
    • 0023568495 scopus 로고
    • Random Self-Reducibility and Zero Knowledge Interactive Proofs of Possession of Information
    • M. Tompa and H. Woll, “Random Self-Reducibility and Zero Knowledge Interactive Proofs of Possession of Information,” Proc. of the 28th FOCS (1987), 472-482.
    • (1987) Proc. of the 28th FOCS , pp. 472-482
    • Tompa, M.1    Woll, H.2
  • 48
    • 0020312165 scopus 로고
    • Protocols for Secure Computation
    • A. Yao, “Protocols for Secure Computation,” Proc. of the 23 FOCS (1982), 160-164.
    • (1982) Proc. of the 23 FOCS , pp. 160-164
    • Yao, A.1
  • 49
    • 0020301290 scopus 로고
    • Theory and Applications of Trapdoor Functions
    • A. Yao, “Theory and Applications of Trapdoor Functions,” Proc. of the 23 FOCS (1982) 80-91.
    • (1982) Proc. of the 23 FOCS , pp. 80-91
    • Yao, A.1
  • 50
    • 0003113271 scopus 로고
    • How to Generate and Exchange Secrets
    • A. Yao, “How to Generate and Exchange Secrets,” Proc. of the 27 FOCS (1986).
    • (1986) Proc. of the 27 FOCS
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.