-
1
-
-
84933507780
-
Efficient multiparty protocols using circuit randomization
-
[Bea91a] LNCS 576
-
[Bea91a] D. Beaver. Efficient multiparty protocols using circuit randomization. In CRYPTO '91, LNCS 576, pp. 420-432, 1991.
-
(1991)
CRYPTO '91
, pp. 420-432
-
-
Beaver, D.1
-
2
-
-
33746365751
-
Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
-
[Bea91b]
-
[Bea91b] D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology, pp. 75-122, 1991.
-
(1991)
Journal of Cryptology
, pp. 75-122
-
-
Beaver, D.1
-
3
-
-
0003661492
-
Bit optimal distributed consensus
-
[BGP92] Preliminary version in Proc. 21st STOC, 1989.
-
[BGP92] P. Berman, J. A. Garay, and K. J. Perry. Bit optimal distributed consensus. Computer Science Research, pp. 313-322, 1992. Preliminary version in Proc. 21st STOC, 1989.
-
(1992)
Computer Science Research
, pp. 313-322
-
-
Berman, P.1
Garay, J.A.2
Perry, K.J.3
-
4
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
[BGW88]
-
[BGW88] M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proc. 20th STOC, pp. 1-10, 1988.
-
(1988)
Proc. 20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
[CCD88]
-
[CCD88] D. Chaum, C. Crépeau, and I. Damgård. Multiparty unconditionally secure protocols (extended abstract). In Proc. 20th STOC, pp. 11-19, 1988.
-
(1988)
Proc. 20th STOC
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
6
-
-
84957717648
-
Efficient multiparty computations secure against an adaptive adversary
-
+99] LNCS 1592
-
+99] R. Cramer, I. Damgård, S. Dziembowski, M. Hirt, and T. Rabin. Efficient multiparty computations secure against an adaptive adversary. In EUROCRYPT '99, LNCS 1592, pp. 311-326, 1999.
-
(1999)
EUROCRYPT '99
, pp. 311-326
-
-
Cramer, R.1
Damgård, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
7
-
-
84864708144
-
Multiparty computations ensuring privacy of each party's input and correctness of the result
-
[CDG87] LNCS 293
-
[CDG87] D. Chaum, I. Damgård, and J. van de Graaf. Multiparty computations ensuring privacy of each party's input and correctness of the result. In CRYPTO '87, LNCS 293, pp. 87-119, 1987.
-
(1987)
CRYPTO '87
, pp. 87-119
-
-
Chaum, D.1
Damgård, I.2
Van De Graaf, J.3
-
8
-
-
0018456171
-
Universal classes of hash functions
-
[CW79] Preliminary version in Proc. 9st STOC, 1977.
-
[CW79] L. Carter and M. N. Wegman. Universal classes of hash functions. Journal of Computer and System Sciences, 18(4):143-154, 1979. Preliminary version in Proc. 9st STOC, 1977.
-
(1979)
Journal of Computer and System Sciences
, vol.18
, Issue.4
, pp. 143-154
-
-
Carter, L.1
Wegman, M.N.2
-
9
-
-
0026839969
-
Modular construction of a Byzantine agreement protocol with optimal message bit complexity
-
[CW92] Preliminary version in Proc. 8th PODC, 1989.
-
[CW92] B. A. Coan and J. L. Welch. Modular construction of a Byzantine agreement protocol with optimal message bit complexity. Information and Computation, 97(1):61-85, 1992. Preliminary version in Proc. 8th PODC, 1989.
-
(1992)
Information and Computation
, vol.97
, Issue.1
, pp. 61-85
-
-
Coan, B.A.1
Welch, J.L.2
-
10
-
-
85051365925
-
Polynomial algorithms for multiple processor agreement
-
[DS82]
-
[DS82] D. Dolev and H. R. Strong. Polynomial algorithms for multiple processor agreement. In Proc. 14th STOC, pp. 401-407, 1982.
-
(1982)
Proc. 14th STOC
, pp. 401-407
-
-
Dolev, D.1
Strong, H.R.2
-
11
-
-
84976655650
-
Cryptographic computation: Secure fault-tolerant protocols and the public-key model
-
[GHY87] LNCS 293
-
[GHY87] Z. Galil, S. Haber, and M. Yung. Cryptographic computation: Secure fault-tolerant protocols and the public-key model. In CRYPTO '87, LNCS 293, pp. 135-155, 1987.
-
(1987)
CRYPTO '87
, pp. 135-155
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
12
-
-
0023545076
-
How to play any mental game - A completeness theorem for protocols with honest majority
-
[GMW87]
-
[GMW87] O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game - a completeness theorem for protocols with honest majority. In Proc. 19th STOC, pp. 218-229, 1987.
-
(1987)
Proc. 19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
13
-
-
84880854377
-
Robustness for free in unconditional multi-party computation
-
[HM01] LNCS 2139
-
[HM01] M. Hirt and U. Maurer. Robustness for free in unconditional multi-party computation. In CRYPTO '01, LNCS 2139, pp. 101-118, 2001.
-
(2001)
CRYPTO '01
, pp. 101-118
-
-
Hirt, M.1
Maurer, U.2
-
14
-
-
35248861868
-
Efficient secure multi-party computation
-
[HMP00] LNCS 1976
-
[HMP00] M. Hirt, U. Maurer, and B. Przydatek. Efficient secure multi-party computation. In ASIACRYPT '00, LNCS 1976, pp. 143-161, 2000.
-
(2000)
ASIACRYPT '00
, pp. 143-161
-
-
Hirt, M.1
Maurer, U.2
Przydatek, B.3
-
15
-
-
84976810569
-
Reaching agreement in the presence of faults
-
[PSL80] Apr.
-
[PSL80] M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. Journal of the ACM, 27(2):228-234, Apr. 1980.
-
(1980)
Journal of the ACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
16
-
-
85008202321
-
Unconditional Byzantine agreement for any number of faulty processors
-
[PW92] LNCS 577
-
[PW92] B. Pfitzmann and M. Waidner. Unconditional Byzantine agreement for any number of faulty processors. In Proc. 9th STAGS, LNCS 577, 1992.
-
(1992)
Proc. 9th STAGS
-
-
Pfitzmann, B.1
Waidner, M.2
-
17
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
[RB89]
-
[RB89] T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In Proc. 21st STOC, pp. 73-85, 1989.
-
(1989)
Proc. 21st STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
18
-
-
0018545449
-
How to share a secret
-
[Sha79]
-
[Sha79] A. Shamir. How to share a secret. Communications of the ACM, 22:612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
19
-
-
0020312165
-
Protocols for secure computations
-
[Yao82]
-
[Yao82] A. C. Yao. Protocols for secure computations. In Proc. 23rd FOCS, pp. 160-164, 1982.
-
(1982)
Proc. 23rd FOCS
, pp. 160-164
-
-
Yao, A.C.1
|