-
1
-
-
85029542707
-
Foundations of secure interactive computation
-
[Be] LNCS, Springer-Verlag, Berlin
-
[Be] D. Beaver. Foundations of secure interactive computation. In Advances in Cryptology - CRYPTO '91, LNCS, pp. 377-391. Springer-Verlag, Berlin, 1992.
-
(1992)
Advances in Cryptology - CRYPTO '91
, pp. 377-391
-
-
Beaver, D.1
-
3
-
-
84955606922
-
Oblivious key escrow
-
[Bl] R. Anderson, editor, volume 1174 of LNCS, Springer-Verlag, Berlin
-
[Bl] M. Blaze. Oblivious key escrow. In R. Anderson, editor, Proc. First Infohiding, volume 1174 of LNCS, pp. 335-343, Springer-Verlag, Berlin, 1996.
-
(1996)
Proc. First Infohiding
, pp. 335-343
-
-
Blaze, M.1
-
4
-
-
84957064831
-
The all-or-nothing nature of two-party secure computation
-
[BMM] volume 1666 of LNCS, Springer-Verlag, Berlin
-
[BMM] A. Beimel, T. Malkin, and S. Micali. The all-or-nothing nature of two-party secure computation. In Advances in Cryptology - CRYPTO '99, volume 1666 of LNCS, pp. 80-97. Springer-Verlag, Berlin, 1999.
-
(1999)
Advances in Cryptology - CRYPTO '99
, pp. 80-97
-
-
Beimel, A.1
Malkin, T.2
Micali, S.3
-
5
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
[Ca]
-
[Ca] R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1): 143-202, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
7
-
-
84957717648
-
Efficient multiparty computations secure against an adaptive adversary
-
-] volume 1592 of LNCS, Springer-Verlag, Berlin
-
-] R. Cramer, I. Damgård, S. Dziembowski, M. Hirt, and T. Rabin. Efficient multiparty computations secure against an adaptive adversary. In. Advances in Cryptology - EUROCRYPT '99, volume 1592 of LNCS, pp. 311-326. Springer-Verlag, Berlin, 1999.
-
(1999)
Advances in Cryptology - EUROCRYPT '99
, pp. 311-326
-
-
Cramer, R.1
Damgård, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
8
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
[Ch]
-
[Ch] D. Chaum. The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology, 1(1):65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
9
-
-
0027341860
-
Perfectly secure message transmission
-
[DDWY] Jan.
-
[DDWY] D. Dolev, C. Dwork, O. Waarts, and M. Yung. Perfectly secure message transmission. Journal of the ACM, 40(1): 17-47, Jan. 1993.
-
(1993)
Journal of the ACM
, vol.40
, Issue.1
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
10
-
-
0022562351
-
Easy impossibility proofs for distributed consensus problems
-
[FLM]
-
[FLM] M. J. Fischer, N. A. Lynch, and M. Merritt. Easy impossibility proofs for distributed consensus problems. Distributed Computing, 1:26-39, 1986.
-
(1986)
Distributed Computing
, vol.1
, pp. 26-39
-
-
Fischer, M.J.1
Lynch, N.A.2
Merritt, M.3
-
12
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
[GL] volume 537 of LNCS, Springer-Verlag, Berlin
-
[GL] S. Goldwasser and L. Levin. Fair computation of general functions in presence of immoral majority. In Advances in Cryptology - CRYPTO '90, volume 537 of LNCS, pp. 77-93. Springer-Verlag, Berlin, 1990.
-
(1990)
Advances in Cryptology - CRYPTO '90
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
18
-
-
0033706604
-
More general completeness theorems for secure two-party computation
-
[Ki3]
-
[Ki3] J. Kilian. More general completeness theorems for secure two-party computation. In Proc. 32nd Annual ACM Symp. on the Theory of Computing, pp. 316-324, 2000.
-
(2000)
Proc. 32nd Annual ACM Symp. on the Theory of Computing
, pp. 316-324
-
-
Kilian, J.1
-
19
-
-
0033725451
-
Reducibility and completeness in private computations
-
[KKMO]
-
[KKMO] J. Kilian, E. Kushilevitz, S. Micali, and R. Ostrovsky. Reducibility and completeness in private computations. SIAM Journal on Computing, 29:1189-1208, 1999.
-
(1999)
SIAM Journal on Computing
, vol.29
, pp. 1189-1208
-
-
Kilian, J.1
Kushilevitz, E.2
Micali, S.3
Ostrovsky, R.4
-
21
-
-
84974655726
-
Secure computation
-
[MR] volume 576 of LNCS, Springer-Verlag, Berlin
-
[MR] S. Micali and P. Rogaway. Secure computation. In. Advances in Cryptology - CRYPTO '91, volume 576 of LNCS, pp. 392-404, Springer-Verlag, Berlin, 1992.
-
(1992)
Advances in Cryptology - CRYPTO '91
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
22
-
-
84976810569
-
Reaching agreement in the presence of faults
-
[PSL] Apr.
-
[PSL] M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. Journal of the ACM, 27(2):228-234, Apr. 1980.
-
(1980)
Journal of the ACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
23
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
[Ra] Harvard Aiken Computation Laboratory
-
[Ra] M. O. Rabin. How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computation Laboratory, 1981.
-
(1981)
Technical Report
, vol.TR-81
-
-
Rabin, M.O.1
-
24
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
[RB]
-
[RB] T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In Proc. 21st ACM Symp. on the Theory of Computing, pp. 73-85, 1989.
-
(1989)
Proc. 21st ACM Symp. on the Theory of Computing
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
|