-
1
-
-
0035166072
-
How to go beyond the black-box simulation barrier
-
B. Barak. How to go Beyond the Black-Box Simulation Barrier. In 42nd FOCS, pages 106-115, 2001.
-
(2001)
42nd FOCS
, pp. 106-115
-
-
Barak, B.1
-
2
-
-
0036949106
-
Constant-round coin-Tossing or realizing the shared-random string model
-
B. Barak. Constant-Round Coin-Tossing or Realizing the Shared-Random String Model. In 43rd FOCS, pages 345-355, 2002.
-
(2002)
43rd FOCS
, pp. 345-355
-
-
Barak, B.1
-
3
-
-
0036294828
-
Universal arguments and their applications
-
B. Barak and O. Goldreich. Universal Arguments and their Applications. 17th CCC, pages 194-203, 2002.
-
(2002)
17th CCC
, pp. 194-203
-
-
Barak, B.1
Goldreich, O.2
-
4
-
-
0036041101
-
Strict polynomial-time in simulation and extraction
-
B. Barak and Y. Lindell. Strict Polynomial-Time in Simulation and Extraction. In 34th STOC, pages 484-493, 2002.
-
(2002)
34th STOC
, pp. 484-493
-
-
Barak, B.1
Lindell, Y.2
-
5
-
-
0002382799
-
Foundations of secure interactive computing
-
Springer-Verlag (LNCS 576); Repetition Lower the Error
-
D. Beaver. Foundations of Secure Interactive Computing. In CRYPTO'91, Springer-Verlag (LNCS 576), pages 377-391, 1991. Repetition Lower the Error
-
(1991)
CRYPTO'91
, pp. 377-391
-
-
Beaver, D.1
-
6
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology, 13(1):143-202, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
7
-
-
0038721038
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 34th STOC, pages 494-503, 2002.
-
(2002)
34th STOC
, pp. 494-503
-
-
Canetti, R.1
-
8
-
-
84880897758
-
Universally composable commitments
-
Springer LNCS 2139
-
R. Canetti and M. Fischlin. Universally Composable Commitments. In Crypto2001, Springer LNCS 2139, pages 19-40, 2001.
-
(2001)
Crypto2001
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
10
-
-
0037605775
-
Black-box concurrent zero-knowledge requires (almost) logarithmically many rounds
-
R. Canetti, J. Kilian, E. Petrank and A. Rosen. Black-Box Concurrent Zero-Knowledge Requires (almost) Logarithmically Many Rounds. SIAM Jour. on Computing, Vol. 32(1), pages 1-47, 2002.
-
(2002)
SIAM Jour. on Computing
, vol.32
, Issue.1
, pp. 1-47
-
-
Canetti, R.1
Kilian, J.2
Petrank, E.3
Rosen, A.4
-
11
-
-
32844458303
-
On the limitations of universally composable two-party computation without set-up assumptions
-
R. Canetti, E. Kushilevitz and Y. Lindell. On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions. To appear in EuroCrypt2003.
-
EuroCrypt2003
-
-
Canetti, R.1
Kushilevitz, E.2
Lindell, Y.3
-
12
-
-
0036038991
-
Universally composable two-party and multi-party computation
-
R. Canetti, Y. Lindell, R. Ostrovsky and A. Sahai. Universally Composable Two-Party and Multi-Party Computation. In 34th STOC, pages 494-503, 2002.
-
(2002)
34th STOC
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
13
-
-
84948970500
-
Efficient concurrent zero-knowledge in the auxiliary string model
-
LNCS 1807
-
I. Damgard. Efficient Concurrent Zero-Knowledge in the Auxiliary String Model. In EuroCrypt2000, LNCS 1807, 418-430, 2000.
-
(2000)
EuroCrypt2000
, pp. 418-430
-
-
Damgard, I.1
-
14
-
-
0343337504
-
Non-malleable cryptography
-
D. Dolev, C. Dwork and M. Naor. Non-Malleable Cryptography. SIAM Jour. on Computing, Vol. 30(2), pages 391-437, 2000.
-
(2000)
SIAM Jour. on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
15
-
-
0031632567
-
Concurrent zero-knowledge
-
C. Dwork, M. Naor and A. Sahai. Concurrent Zero-Knowledge. In 30th STOC, pages 409-418, 1998.
-
(1998)
30th STOC
, pp. 409-418
-
-
Dwork, C.1
Naor, M.2
Sahai, A.3
-
16
-
-
84957623615
-
Concurrent zero-knowledge: Reducing the need for timing constraints
-
Springer LNCS 1462
-
C. Dwork and A. Sahai. Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints. In Cryto98, Springer LNCS 1462, pages 442-457, 1998.
-
(1998)
Cryto98
, pp. 442-457
-
-
Dwork, C.1
Sahai, A.2
-
17
-
-
0345711989
-
-
Ph.D. thesis, Alternative Models for Zero Knowledge Interactive Proofs. Weizmann Institute of Science
-
U. Feige. Ph.D. thesis, Alternative Models for Zero Knowledge Interactive Proofs. Weizmann Institute of Science, 1990.
-
(1990)
-
-
Feige, U.1
-
18
-
-
0345711987
-
-
Draft of a Chapter on general Protocols
-
O. Goldreich. Draft of a Chapter on general Protocols. Available at: http://www.wisdom.weizmann.ac.il/-oded/PSBookFrag/prot.ps
-
-
-
Goldreich, O.1
-
20
-
-
0029767165
-
On the composition of zero-knowledge proof systems
-
O. Goldreich and H. Krawczyk. On the Composition of Zero-Knowledge Proof Systems. SIAM Jour. on Computing, Vol. 25(1), pages 169-192, 1996.
-
(1996)
SIAM Jour. on Computing
, vol.25
, Issue.1
, pp. 169-192
-
-
Goldreich, O.1
Krawczyk, H.2
-
21
-
-
71149116146
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
-
O. Goldreich, S. Micali and A. Wigderson. Proofs that Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems. JACM, Vol. 38(1), pp. 691-729, 1991.
-
(1991)
JACM
, vol.38
, Issue.1
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
22
-
-
0023545076
-
How to play any mental game - A completeness theorem for protocols with honest majority
-
O. Goldreich, S. Micali and A. Wigderson. How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In 19th STOC, pages 218-229, 1987.
-
(1987)
19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
23
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
Springer-Verlag (LNCS 537)
-
S. Goldwasser and L. Levin. Fair Computation of General Functions in Presence of Immoral Majority. In CRYPTO'90, Springer-Verlag (LNCS 537), pages 77-93, 1990.
-
(1990)
CRYPTO'90
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
24
-
-
0034830278
-
Concurrent and resettable zero-knowledge in poly-logarithmic rounds
-
J. Kilian and E. Petrank. Concurrent and Resettable Zero-Knowledge in Poly-logarithmic Rounds. In 33rd STOC, pages 560-569, 2001.
-
(2001)
33rd STOC
, pp. 560-569
-
-
Kilian, J.1
Petrank, E.2
-
25
-
-
0032319637
-
Lower bounds for zero-knowledge on the internet
-
J. Kilian, E. Petrank and C. Rackoff. Lower Bounds for Zero-Knowledge on the Internet. In 39th FOCS, pages 484-492, 1998.
-
(1998)
39th FOCS
, pp. 484-492
-
-
Kilian, J.1
Petrank, E.2
Rackoff, C.3
-
26
-
-
0038446804
-
Bounded-concurrent secure two-party computation without setup assumptions
-
Y. Lindell. Bounded-Concurrent Secure Two-Party Computation Without Setup Assumptions. To appear in 34th STOC, 2003.
-
(2003)
34th STOC
-
-
Lindell, Y.1
-
27
-
-
0034854953
-
CS proofs
-
S. Micali. CS Proofs. SIAM Jour. on Computing, Vol. 30 (4), pages 1253-1298, 2000.
-
(2000)
SIAM Jour. on Computing
, vol.30
, Issue.4
, pp. 1253-1298
-
-
Micali, S.1
-
28
-
-
84974655726
-
Secure computation
-
Unpublished manuscript; Preliminary version in CRYPTO'91, Springer-Verlag (LNCS 576), pages 392-404, 1991
-
S. Micali and P. Rogaway. Secure computation. Unpublished manuscript, 1992. Preliminary version in CRYPTO'91, Springer-Verlag (LNCS 576), pages 392-404, 1991.
-
(1992)
-
-
Micali, S.1
Rogaway, P.2
-
29
-
-
0001448484
-
Bit commitment using pseudorandomness
-
M. Naor. Bit Commitment using Pseudorandomness. Jour. of Cryptology, Vol. 4, pages 151-158, 1991.
-
(1991)
Jour. of Cryptology
, vol.4
, pp. 151-158
-
-
Naor, M.1
-
30
-
-
35248833045
-
Simulation in quasi-polynomial time and its application to protocol composition
-
Springer LNCS, 2656
-
R. Pass. Simulation in Quasi-polynomial Time and its Application to Protocol Composition. In EuroCrypt2003, Springer LNCS, 2656, pages 160-176, 2003.
-
(2003)
EuroCrypt2003
, pp. 160-176
-
-
Pass, R.1
-
31
-
-
84943423699
-
On deniability in the common reference string and random oracle model
-
R. Pass. On Deniability in the Common Reference String and Random Oracle Model. To appear in Crypto2003
-
Crypto2003
-
-
Pass, R.1
-
33
-
-
84957621865
-
On the concurrent composition of zero-knowledge proofs
-
Springer LNCS 1592
-
R. Richardson and J. Kilian. On the Concurrent Composition of Zero-Knowledge Proofs. In EuroCrypt99, Springer LNCS 1592, pages 415-431, 1999.
-
(1999)
EuroCrypt99
, pp. 415-431
-
-
Richardson, R.1
Kilian, J.2
-
34
-
-
84983126760
-
A note on the round-complexity of concurrent zero-knowledge
-
Springer LNCS 1880
-
A. Rosen. A note on the round-complexity of Concurrent Zero-Knowledge. In Crypto2000, Springer LNCS 1880, pages 451-468, 2000.
-
(2000)
Crypto2000
, pp. 451-468
-
-
Rosen, A.1
-
35
-
-
0022882770
-
How to generate and exchange secrets
-
A. Yao. How to Generate and Exchange Secrets. In 27th FOCS, pages 162-167, 1986.
-
(1986)
27th FOCS
, pp. 162-167
-
-
Yao, A.1
|