-
1
-
-
0002382799
-
Foundations of secure interactive computing
-
(LNCS 576), Springer-Verlag, Berlin
-
D. Beaver. Foundations of Secure Interactive Computing. In CRYPTO '91 (LNCS 576), pages 377-391, Springer-Verlag, Berlin, 1991.
-
(1991)
CRYPTO '91
, pp. 377-391
-
-
Beaver, D.1
-
2
-
-
0024769014
-
Multiparty computation with faulty majority
-
D. Beaver and S. Goldwasser. Multiparty Computation with Faulty Majority. In Proc. 30th FOCS, pages 468-473, 1989.
-
(1989)
Proc. 30th FOCS
, pp. 468-473
-
-
Beaver, D.1
Goldwasser, S.2
-
3
-
-
0000917097
-
Cryptographic protocols provably secure against dynamic adversaries
-
(LNCS 658), Springer-Verlag, Berlin
-
D. Beaver and S. Haber. Cryptographic Protocols Provably Secure Against Dynamic Adversaries. In EUROCRYPT '92 (LNCS 658), pages 307-323, Springer-Verlag, Berlin, 1992.
-
(1992)
EUROCRYPT '92
, pp. 307-323
-
-
Beaver, D.1
Haber, S.2
-
4
-
-
0025137207
-
The Round Complexity of Secure Protocols
-
D. Beaver, S. Micali and P. Rogaway. The Round Complexity of Secure Protocols. In Proc. 22nd STOC, pages 503-513, 1990.
-
(1990)
Proc. 22nd STOC
, pp. 503-513
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
5
-
-
0346342609
-
Optimally-resilient interactive consistency in constant time
-
M. Ben-Or and R. El-Yaniv. Optimally-Resilient Interactive Consistency in Constant Time. Distributed Computing, 16(4):249-262, 2003.
-
(2003)
Distributed Computing
, vol.16
, Issue.4
, pp. 249-262
-
-
Ben-Or, M.1
El-Yaniv, R.2
-
6
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser and A. Wigderson. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In Proc. 20th STOC, pages 1-10, 1988.
-
(1988)
Proc. 20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
7
-
-
0003384765
-
How to prove a theorem so no one else can claim It
-
Berkeley, California
-
M. Blum. How to Prove a Theorem so No One Else Can Claim It. Proceedings of the International Congress of Mathematicians, Berkeley, California, pp. 1444-1451, 1986.
-
(1986)
Proceedings of the International Congress of Mathematicians
, pp. 1444-1451
-
-
Blum, M.1
-
8
-
-
0011797655
-
An asynchronous [(n - 1)/3]-resilient consensus protocol
-
G. Bracha. An Asynchronous [(n - 1)/3]-Resilient Consensus Protocol. In Proc. 3rd PODC, pages 154-162, 1984.
-
(1984)
Proc. 3rd PODC
, pp. 154-162
-
-
Bracha, G.1
-
9
-
-
0000731055
-
Security and composition of multi-party cryptographic protocols
-
R. Canetti. Security and Composition of Multi-Party Cryptographic Protocols. Journal of Cryptology, 13(1): 143-202, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
10
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In Proc. 42nd FOCS, pages 136-145, 2001.
-
(2001)
Proc. 42nd FOCS
, pp. 136-145
-
-
Canetti, R.1
-
12
-
-
84880897758
-
Universally composable commitments
-
(LNCS 2139), Springer-Verlag, Berlin
-
R. Canetti and M. Fischlin. Universally Composable Commitments. In CRYPTO 2001 (LNCS 2139), pages 19-40, Springer-Verlag, Berlin, 2001.
-
(2001)
CRYPTO 2001
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
13
-
-
84947232363
-
Universally composable notions of key-exchange and secure channels
-
(LNCS 2332), Springer-Verlag, Berlin
-
R. Canetti and H. Krawczyk. Universally Composable Notions of Key-Exchange and Secure Channels. In EUROCRYPT 2002 (LNCS 2332), pages 337-351, Springer-Verlag, Berlin, 2002.
-
(2002)
EUROCRYPT 2002
, pp. 337-351
-
-
Canetti, R.1
Krawczyk, H.2
-
14
-
-
0036038991
-
Universally composable two-party and multi-party secure computation
-
R. Canetti, Y. Lindell, R. Ostrovsky and A. Sahai. Universally Composable Two-Party and Multi-Party Secure Computation. In Proc. 34th STOC, pages 494-503, 2002.
-
(2002)
Proc. 34th STOC
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
15
-
-
0027313816
-
Fast asynchronous Byzantine agreement with optimal resilience
-
R. Canetti and T. Rabin. Fast Asynchronous Byzantine Agreement with Optimal Resilience. In. Proc. 25th STOC, pages 42-51, 1993.
-
(1993)
Proc. 25th STOC
, pp. 42-51
-
-
Canetti, R.1
Rabin, T.2
-
16
-
-
84898947315
-
Multi-party unconditionally secure protocols
-
D. Chaum, C. Crepeau and I. Damgard. Multi-Party Unconditionally Secure Protocols. In Proc. 20th STOC, pages 11-19, 1988.
-
(1988)
Proc. 20th STOC
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
17
-
-
0009768331
-
The Byzantine generals strike again
-
D. Dolev. The Byzantine Generals Strike Again. Journal of Algorithms, 3(1):14-30, 1982.
-
(1982)
Journal of Algorithms
, vol.3
, Issue.1
, pp. 14-30
-
-
Dolev, D.1
-
18
-
-
84976826800
-
Zero-knowledge proofs of knowledge in two rounds
-
(LNCS 435), Springer-Verlag, Berlin
-
U. Feige and A. Shamir. Zero-Knowledge Proofs of Knowledge in Two Rounds. In CRYPTO '89 (LNCS 435), pages 526-544, Springer-Verlag, Berlin, 1989.
-
(1989)
CRYPTO '89
, pp. 526-544
-
-
Feige, U.1
Shamir, A.2
-
19
-
-
0031210863
-
An optimal algorithm for synchronous Byzantine agreement
-
P. Feldman and S. Micali. An Optimal Algorithm for Synchronous Byzantine agreement. SIAM Journal of Computing, 26(2):873-933, 1997.
-
(1997)
SIAM Journal of Computing
, vol.26
, Issue.2
, pp. 873-933
-
-
Feldman, P.1
Micali, S.2
-
20
-
-
84947209216
-
Unconditional Byzantine agreement and multi-party computation secure against dishonest minorities from scratch
-
(LNCS 2332), Springer-Verlag, Berlin
-
M. Fitzi, N. Gisin, U. Maurer and O. Von Rotz. Unconditional Byzantine Agreement and Multi-Party Computation Secure Against Dishonest Minorities from Scratch. In EUROCRYPT 2002 (LNCS 2332), pages 482-501, Springer-Verlag, Berlin, 2002.
-
(2002)
EUROCRYPT 2002
, pp. 482-501
-
-
Fitzi, M.1
Gisin, N.2
Maurer, U.3
Von Rotz, O.4
-
21
-
-
0036954542
-
Byzantine agreement secure against faulty majorities from scratch
-
M. Fitzi, D. Gottesman, M. Hirt, T. Holenstein and A. Smith. Byzantine Agreement Secure Against Faulty Majorities From Scratch. In Proc. 21st PODC, pages 118-126, 2002.
-
(2002)
Proc. 21st PODC
, pp. 118-126
-
-
Fitzi, M.1
Gottesman, D.2
Hirt, M.3
Holenstein, T.4
Smith, A.5
-
22
-
-
84976655650
-
Cryptographic computation: Secure fault tolerant protocols and the public key model
-
(LNCS 293), Springer-Verlag, Berlin
-
Z. Galil, S. Haber and M. Yung. Cryptographic Computation: Secure Fault Tolerant Protocols and the Public Key Model. In CRYPTO '87 (LNCS 293), pages 135-155, Springer-Verlag, Berlin, 1987.
-
(1987)
CRYPTO '87
, pp. 135-155
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
23
-
-
0003839182
-
-
Manuscript, version 1.4
-
O. Goldreich. Secure Multi-Party Computation. Manuscript, version 1.4, 2002. Available from http://www.wisdom.weizmann.ac.il/~oded/pp.html.
-
(2002)
Secure Multi-party Computation
-
-
Goldreich, O.1
-
24
-
-
0036038989
-
Concurrent zero-knowledge with timing revisited
-
O. Goldreich. Concurrent Zero-Knowledge with Timing Revisited. In Proc. 34th STOC, pages 332-340, 2002.
-
(2002)
Proc. 34th STOC
, pp. 332-340
-
-
Goldreich, O.1
-
25
-
-
0023545076
-
How to play any mental game-A completeness theorem for protocols with honest majority
-
For details see [23]
-
O. Goldreich, S. Micali and A. Wigderson. How to Play Any Mental Game-A Completeness Theorem for Protocols with Honest Majority. In Proc. 19th STOC, pages 218-229, 1987. For details see [23].
-
(1987)
Proc. 19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
26
-
-
71149116146
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
-
O. Goldreich, S. Micali and A. Wigderson. Proofs that Yield Nothing but Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems. Journal of the ACM, 38(1):691-729, 1991.
-
(1991)
Journal of the ACM
, vol.38
, Issue.1
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
27
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
(LNCS 537), Spring-Verlag, Berlin
-
S. Goldwasser and L. Levin. Fair Computation of General Functions in Presence of Immoral Majority. In CRYPTO '90 (LNCS 537), pages 77-93, Spring-Verlag, Berlin, 1990.
-
(1990)
CRYPTO '90
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
28
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
J.Kilian, Founding Cryptography on Oblivious Transfer. In Proc. 20th STOC, pages 20-31, 1988.
-
(1988)
Proc. 20th STOC
, pp. 20-31
-
-
Kilian, J.1
-
29
-
-
4544353942
-
A general completeness theorem for two-party games
-
J. Kilian, A General Completeness Theorem for Two-Party Games. In Proc. 23rd STOC, pages 553-560, 1991.
-
(1991)
Proc. 23rd STOC
, pp. 553-560
-
-
Kilian, J.1
-
30
-
-
0020780905
-
The weak Byzantine generals problem
-
L. Lamport. The Weak Byzantine Generals Problem. Journal of the ACM, 30(3):668-676, 1983.
-
(1983)
Journal of the ACM
, vol.30
, Issue.3
, pp. 668-676
-
-
Lamport, L.1
-
32
-
-
0036038649
-
On the composition of authenticated Byzantine agreement
-
Y. Lindell, A. Lysyanskaya and T. Rabin. On the Composition of Authenticated Byzantine Agreement. In Proc. 34th STOC, pages 514-523, 2002.
-
(2002)
Proc. 34th STOC
, pp. 514-523
-
-
Lindell, Y.1
Lysyanskaya, A.2
Rabin, T.3
-
33
-
-
35048903637
-
Lower bounds for concurrent self composition
-
(LNCS 2951), Springer-Verlag, Berlin
-
Y. Lindell. Lower Bounds for Concurrent Self Composition. In Proceedings of the 1st Theory of Cryptography Conference (TCC) (LNCS 2951), pages 203-222, Springer-Verlag, Berlin, 2004.
-
(2004)
Proceedings of the 1st Theory of Cryptography Conference (TCC)
, pp. 203-222
-
-
Lindell, Y.1
-
34
-
-
84974655726
-
Secure computation
-
Unpublished manuscript, 1992. Preliminary version (LNCS 576), Springer-Verlag, Berlin
-
S. Micali and P. Rogaway. Secure Computation. Unpublished manuscript, 1992. Preliminary version in CRYPTO '91 (LNCS 576), pages 392-404, Springer-Verlag, Berlin, 1991.
-
(1991)
CRYPTO '91
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
35
-
-
84976810569
-
Reaching Agreement in the Presence of Faults
-
M. Pease, R. Shostak and L. Lamport. Reaching Agreement in the Presence of Faults. Journal of the ACM, 27(2):228-234, 1980.
-
(1980)
Journal of the ACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
36
-
-
0003445668
-
Information-theoretic pseudosignatures and Byzantine agreement for t >= n/3
-
(#90830), IBM Research
-
B. Pfitzmann and M. Waidner. Information-Theoretic Pseudosignatures and Byzantine Agreement for t >= n/3. Technical Report RZ 2882 (#90830), IBM Research, 1996.
-
(1996)
Technical Report
, vol.RZ 2882
-
-
Pfitzmann, B.1
Waidner, M.2
-
37
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
T. Rabin and M. Ben-Or. Verifiable Secret Sharing and Multiparty Protocols with Honest Majority. In Proc. 21st STOC, pages 73-85, 1989.
-
(1989)
Proc. 21st STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
38
-
-
0022882770
-
How to generate and exchange secrets
-
A. Yao. How to Generate and Exchange Secrets. In Proc. 27th FOCS, pages 162-167, 1986.
-
(1986)
Proc. 27th FOCS
, pp. 162-167
-
-
Yao, A.1
|