메뉴 건너뛰기




Volumn Part F129230, Issue , 1998, Pages 92-106

Server-assisted cryptography

Author keywords

[No Author keywords available]

Indexed keywords

ECONOMIC AND SOCIAL EFFECTS;

EID: 84986251750     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/310889.310923     Document Type: Conference Paper
Times cited : (17)

References (37)
  • 2
    • 33746365751 scopus 로고
    • Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
    • D. Beaver. "Secure Multiparty Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority." J. Cryptology 4:2 1991, 75-122.
    • (1991) J. Cryptology , vol.4 , Issue.2 , pp. 75-122
    • Beaver, D.1
  • 3
    • 85029542707 scopus 로고
    • Foundations of secure interactive computing
    • Springer-Verlag LNCS 576
    • D. Beaver. "Foundations of Secure Interactive Computing." Advances in Cryptology - Crypto '91 Proceedings, Springer-Verlag LNCS 576, 1992, 377-391.
    • (1992) Advances in Cryptology - Crypto '91 Proceedings , pp. 377-391
    • Beaver, D.1
  • 4
    • 84933507780 scopus 로고
    • Efficient multiparty protocols using circuit randomization
    • Springer-Verlag LNCS 576
    • D. Beaver. "Efficient Multiparty Protocols Using Circuit Randomization." Advances in Cryptology - Crypto '91 Proceedings, Springer-Verlag LNCS 576, 1992, 420-432.
    • (1992) Advances in Cryptology - Crypto '91 Proceedings , pp. 420-432
    • Beaver, D.1
  • 7
    • 0030679850 scopus 로고    scopus 로고
    • Commodity-based cryptography
    • ACM
    • th STOC, ACM, 1997, 446-455.
    • (1997) th STOC , pp. 446-455
    • Beaver, D.1
  • 8
    • 85032877753 scopus 로고
    • Non-interactive oblivious transfer and applications
    • Springer-Verlag LNCS 435
    • M. Bellare, S. Micali. "Non-Interactive Oblivious Transfer and Applications." Advances in Cryptology - Crypto '89 Proceedings, Springer-Verlag LNCS 435, 1990, 547-557.
    • (1990) Advances in Cryptology - Crypto '89 Proceedings , pp. 547-557
    • Bellare, M.1    Micali, S.2
  • 12
    • 84976804419 scopus 로고
    • How to exchange (Secret) keys
    • May
    • M. Blum. "How to Exchange (Secret) Keys." ACM Trans. Comput. Sys. 1:2 May 1983, 175-193.
    • (1983) ACM Trans. Comput. Sys , vol.1 , Issue.2 , pp. 175-193
    • Blum, M.1
  • 13
    • 0022716288 scopus 로고
    • A simple unpredictable pseudo-random number generator
    • May
    • L. Blum, M. Blum, M. Shub. "A Simple Unpredictable Pseudo-Random Number Generator." SIAM J. on Computing 15:2 May 1986, 364-383.
    • (1986) SIAM J. on Computing , vol.15 , Issue.2 , pp. 364-383
    • Blum, L.1    Blum, M.2    Shub, M.3
  • 17
    • 0012610677 scopus 로고
    • Limits on the security of coin flips when half the processors are faulty
    • ACM
    • th STOC, ACM, 1986, 364-370.
    • (1986) th STOC , pp. 364-370
    • Cleve, R.1
  • 18
    • 85030121757 scopus 로고
    • Equivalence between two flavours of oblivious transfers
    • Springer-Verlag LNCS 293
    • C. Crépeau. "Equivalence Between Two Flavours of Oblivious Transfers." Advances in Cryptology - Crypto '87 Proceedings, Springer-Verlag LNCS 293, 1988, 350-354.
    • (1988) Advances in Cryptology - Crypto '87 Proceedings , pp. 350-354
    • Crépeau, C.1
  • 19
    • 85029211337 scopus 로고    scopus 로고
    • Efficient cryptographic protocols based on noisy channels
    • April 9
    • C. Crépeau. "Efficient Cryptographic Protocols Based on Noisy Channels." Manuscript, April 9, 1996.
    • (1996) Manuscript
    • Crépeau, C.1
  • 20
    • 0024132071 scopus 로고
    • Achieving oblivious transfer using weakened security assumptions
    • IEEE
    • th FOCS, IEEE, 1988, 42-52.
    • (1988) th FOCS , pp. 42-52
    • Crépeau, C.1    Kitian, J.2
  • 22
    • 84976810569 scopus 로고
    • Reaching agreement in the presence of faults
    • M. Pease, R. Shostak, L. Lamport. "Reaching Agreement in the Presence of Faults." JACM 27:2, 1980, 228-234.
    • (1980) JACM , vol.27 , Issue.2 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 23
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • S. Even, O. Goldreich, A. Lempel. "A Randomized Protocol for Signing Contracts." Comm. of the ACM 28:6, 1985, 637-647.
    • (1985) Comm. of the ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 24
    • 0024135240 scopus 로고
    • Zero knowledge proofs of identity
    • U. Feige, A. Fiat, A. Shamir. "Zero Knowledge Proofs of Identity." J. Cryptology 1:2, 1988, 77-94.
    • (1988) J. Cryptology , vol.1 , Issue.2 , pp. 77-94
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 25
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • S. Goldwasser, S. Micali, C. Rackoff. "The Knowledge Complexity of Interactive Proof Systems." SIAM J. on Computing 18:1, 1989, 186-208.
    • (1989) SIAM J. on Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 26
    • 0022914590 scopus 로고
    • Proofs that yield nothing but their validity and a methodology of cryptographic protocol design
    • IEEE 1986
    • th FOCS, IEEE, 1986, 1986, 174-187.
    • (1986) th FOCS , pp. 174-187
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 29
    • 84898989941 scopus 로고
    • Founding cryptography on oblivious transfer
    • ACM, 1988
    • th STOC, ACM, 1988, 1988, 20-29.
    • (1988) th STOC , pp. 20-29
    • Kilian, J.1
  • 30
    • 0020271558 scopus 로고
    • Inferring a sequence generated by a linear congruence
    • IEEE
    • rd FOCS, IEEE, 1982, 153-159.
    • (1982) rd FOCS , pp. 153-159
    • Plumstead, J.1
  • 33
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • ACM
    • st STOC, ACM, 1989, 73-85.
    • (1989) st STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 34
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • J. Saltzer, M. Schroeder. "The Protection of Information in Computer Systems." Proc. IEEE 63:9, September 1975, 1278-130.
    • (1975) Proc. IEEE , vol.63 , Issue.9 , pp. 1130-1278
    • Saltzer, J.1    Schroeder, M.2
  • 35
  • 36
    • 0023568495 scopus 로고
    • Random self-reducibility and zero-knowledge proofs of possession of information
    • IEEE
    • th FOCS, IEEE, 1987, 472-482.
    • (1987) th FOCS , pp. 472-482
    • Tompa, M.1    Woll, H.2
  • 37
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • IEEE
    • rd FOCS, IEEE, 1982, 160-164.
    • (1982) rd FOCS , pp. 160-164
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.