메뉴 건너뛰기




Volumn 27, Issue 2, 1998, Pages 506-544

Fault-tolerant computation in the full information model

Author keywords

Fault tolerant multiparty protocols; Influences in general two party computations; Sampling with weak sources of randomness

Indexed keywords


EID: 1542674248     PISSN: 00975397     EISSN: None     Source Type: Journal    
DOI: 10.1137/S0097539793246689     Document Type: Article
Times cited : (31)

References (26)
  • 1
    • 0027576476 scopus 로고
    • Coin-flipping games immune against linear-sized coalitions
    • N. ALON AND M. NAOR, Coin-flipping games immune against linear-sized coalitions, SIAM J. Comput., 22 (1993), pp. 403-417.
    • (1993) SIAM J. Comput. , vol.22 , pp. 403-417
    • Alon, N.1    Naor, M.2
  • 2
    • 0024769014 scopus 로고
    • Distributed computation with faulty majority
    • IEEE Computer Society Press, Los Alamitos, CA
    • D. BEAVER AND S. GOLDWASSER, Distributed computation with faulty majority, in Proc. 30th Annual IEEE Symp. on Foundations of Computing, IEEE Computer Society Press, Los Alamitos, CA, 1989, pp. 468-473.
    • (1989) Proc. 30th Annual IEEE Symp. on Foundations of Computing , pp. 468-473
    • Beaver, D.1    Goldwasser, S.2
  • 4
    • 0002897287 scopus 로고
    • Collective coin flipping
    • S. Micali, ed., JAI Press, Greenwich, CT
    • M. BEN-OR AND N. LINIAL, Collective coin flipping, in Randomness and Computation, S. Micali, ed., JAI Press, Greenwich, CT, 1989, pp. 91-115.
    • (1989) Randomness and Computation , pp. 91-115
    • Ben-Or, M.1    Linial, N.2
  • 5
    • 0012726585 scopus 로고
    • Collective coin flipping and other models of imperfect randomness
    • Combinatorics Eger
    • M. BEN-OR, N. LINIAL, AND M. SAKS, Collective coin flipping and other models of imperfect randomness, Colloq, Math Soc. János Bolyai 52, Combinatorics Eger 1987, pp. 75-112.
    • (1987) Colloq, Math Soc. János Bolyai , vol.52 , pp. 75-112
    • Ben-Or, M.1    Linial, N.2    Saks, M.3
  • 6
    • 0023985259 scopus 로고
    • Unbiased bits from sources of weak randomness and probabilistic communication complexity
    • B. CHOR AND O. GOLDREICH, Unbiased bits from sources of weak randomness and probabilistic communication complexity, SIAM J. Comput., 17 (1988), pp. 230-261.
    • (1988) SIAM J. Comput. , vol.17 , pp. 230-261
    • Chor, B.1    Goldreich, O.2
  • 8
  • 9
    • 0027206125 scopus 로고
    • Fast perfect-information leader election protocol with linear immunity
    • San Diego, ACM, New York; Combinatorica, to appear
    • J. COOPER AND N. LINIAL, Fast perfect-information leader election protocol with linear immunity, in 25th Annual ACM Symposium on the Theory of Computing, San Diego, ACM, New York, 1993, pp. 662-671; Combinatorica, to appear.
    • (1993) 25th Annual ACM Symposium on the Theory of Computing , pp. 662-671
    • Cooper, J.1    Linial, N.2
  • 10
    • 84957052653 scopus 로고
    • Interactive hashing can simplify zero-knowledge protocol design without computational assumptions
    • Advances in Cryptology, Proceedings of Crypto93, Springer-Verlag, New York
    • I. DAMGÅRD, Interactive hashing can simplify zero-knowledge protocol design without computational assumptions, in Advances in Cryptology, Proceedings of Crypto93, Lecture Notes in Computer Science 773, Springer-Verlag, New York, 1983, pp. 100-109.
    • (1983) Lecture Notes in Computer Science , vol.773 , pp. 100-109
    • Damgård, I.1
  • 11
    • 84976655650 scopus 로고
    • Cryptographic computation: Secure faulty-tolerant protocols and the public key model
    • Advances in Cryptology, Proceedings of Crypto87, Springer-Verlag, New York
    • Z. GALIL, S. HABER, AND M. YUNG, Cryptographic computation: Secure faulty-tolerant protocols and the public key model, in Advances in Cryptology, Proceedings of Crypto87, Lecture Notes in Computer Science 293, Springer-Verlag, New York, 1987, pp. 135-155.
    • (1987) Lecture Notes in Computer Science , vol.293 , pp. 135-155
    • Galil, Z.1    Haber, S.2    Yung, A.M.3
  • 12
    • 85034479527 scopus 로고
    • Fault-tolerant Computation in the Full Information Model
    • Computer Science Dept., Technion, Haifa, Israel, July
    • O. GOLDREICH, S. GOLDWASSER, AND N. LINIAL, Fault-tolerant Computation in the Full Information Model, Tech. report TR-682, Computer Science Dept., Technion, Haifa, Israel, July 1991.
    • (1991) Tech. Report , vol.TR-682
    • Goldreich, O.1    Goldwasser, S.2    Linial, N.3
  • 13
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity and a methodology for cryptographic protocol design
    • O. GOLDREICH, S. MICALI, AND A. WIGDERSON, Proofs that yield nothing but their validity and a methodology for cryptographic protocol design, J. Assoc. Comput. Mach., 38 (1991), pp. 691-729.
    • (1991) J. Assoc. Comput. Mach. , vol.38 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 15
    • 84955564077 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • Advances in Cryptology, Proceedings of Crypto90, Springer-Verlag, New York
    • S. GOLDWASSER AND L. A. LEVIN, Fair computation of general functions in presence of immoral majority, in Advances in Cryptology, Proceedings of Crypto90, Lecture Notes in Computer Science 537, Springer-Verlag, New York, 1990, pp. 77-93.
    • (1990) Lecture Notes in Computer Science , vol.537 , pp. 77-93
    • Goldwasser, S.1    Levin, L.A.2
  • 18
    • 84958615425 scopus 로고
    • Perfect zero-knowledge arguments for NP can be based on general complexity assumptions
    • Advances in Cryptology, Proceedings of Crypto92, Springer-Verlag, New York
    • M. NAOR, R. OSTROVSKY, R. VENKATESAN, AND M. YUNG, Perfect zero-knowledge arguments for NP can be based on general complexity assumptions, in Advances in Cryptology, Proceedings of Crypto92, Lecture Notes in Computer Science 740, Springer-Verlag, New York, 1992; J. Cryptology, to appear.
    • (1992) Lecture Notes in Computer Science , vol.740
    • Naor, M.1    Ostrovsky, R.2    Venkatesan, R.3    Yung, M.4
  • 19
    • 85034469386 scopus 로고    scopus 로고
    • to appear
    • M. NAOR, R. OSTROVSKY, R. VENKATESAN, AND M. YUNG, Perfect zero-knowledge arguments for NP can be based on general complexity assumptions, in Advances in Cryptology, Proceedings of Crypto92, Lecture Notes in Computer Science 740, Springer-Verlag, New York, 1992; J. Cryptology, to appear.
    • J. Cryptology
  • 22
    • 84949022452 scopus 로고
    • Interactive hashing simplifies zero-knowledge protocol design
    • Proc. Eurocrypt93, Springer-Verlag, New York
    • R. OSTROVSKY, R. VENKATESAN, AND M. YUNG, Interactive hashing simplifies zero-knowledge protocol design, in Proc. Eurocrypt93, Lecture Notes in Computer Science 765, Springer-Verlag, New York, 1983, pp. 267-273.
    • (1983) Lecture Notes in Computer Science , vol.765 , pp. 267-273
    • Ostrovsky, R.1    Venkatesan, R.2    Yung, M.3
  • 23
    • 0021546972 scopus 로고
    • Generating quasi-random sequences from slightly-random sources
    • IEEE Computer Society Press, Los Alamitos, CA
    • M. SANTHA AND U. V. VAZIRANI, Generating quasi-random sequences from slightly-random sources, in 25th Annual IEEE Symp. on Foundation of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1984, pp. 434-440.
    • (1984) 25th Annual IEEE Symp. on Foundation of Computer Science , pp. 434-440
    • Santha, M.1    Vazirani, U.V.2
  • 24
    • 0022252339 scopus 로고
    • Random polynomial time is equal to slightly-random polynomial time
    • IEEE Computer Society Press, Los Alamitos, CA
    • U. V. VAZIRANI AND V. V. VAZIRANI, Random polynomial time is equal to slightly-random polynomial time, in 26th Annual IEEE Symp. on Foundation of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1985, pp. 417-428.
    • (1985) 26th Annual IEEE Symp. on Foundation of Computer Science , pp. 417-428
    • Vazirani, U.V.1    Vazirani, V.V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.