-
1
-
-
78149360960
-
Logical design with three-input majority gates
-
[AR] Mar.
-
[AR] S. Akers and T. Robbins. Logical design with three-input majority gates. Computer Design, pp. 1227, Mar. 1963.
-
(1963)
Computer Design
, pp. 1227
-
-
Akers, S.1
Robbins, T.2
-
3
-
-
38249015281
-
Shifting gears: Changing algorithms on the fly to expedite Byzantine agreement
-
[BDDS] Apr.
-
[BDDS] A. Bar-Noy, D. Dolev, C. Dwork, and H. R. Strong. Shifting gears: changing algorithms on the fly to expedite Byzantine agreement. Information and Computation, 97(2):205-233, Apr. 1992.
-
(1992)
Information and Computation
, vol.97
, Issue.2
, pp. 205-233
-
-
Bar-Noy, A.1
Dolev, D.2
Dwork, C.3
Strong, H.R.4
-
6
-
-
33746365751
-
Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
-
[Be3]
-
[Be3] D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryplology, 4(2): 75-122, 1991
-
(1991)
Journal of Cryplology
, vol.4
, Issue.2
, pp. 75-122
-
-
Beaver, D.1
-
7
-
-
84898960610
-
Completeness theorems for non-cryptographic faulttolerant distributed computation
-
[BGW]
-
[BGW] M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic faulttolerant distributed computation. In Proc. 20th ACM Symposium on the Tlieory of Computing (STOQ.pp. 1-10, 1988.
-
(1988)
Proc.
, vol.20
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
8
-
-
85027202957
-
Generalized secret sharing and monotone functions
-
[BL] Springer-Verlag, Berlin
-
[BL] J. C. Benaloh and J. Leichter. Generalized secret sharing and monotone functions. In Advances in Cryptology -CRYPTO '88, volume 403 of Lecture Notes in Computer Science, pp. 27-35. Springer-Verlag, Berlin, 1988.
-
(1988)
Advances in Cryptology -CRYPTO '88, Volume 403 of Lecture Notes in Computer Science
, vol.403
, pp. 27-35
-
-
Benaloh, J.C.1
Leichter, J.2
-
9
-
-
33745996427
-
Quorum-based secure multi-party computation. in
-
[BW] Springer-Verlag, Berlin
-
[BW] D. Beaver and A. Wool. Quorum-based secure multi-party computation. In Advances in Cryptology - EUROCRYPT '98, volume 1403 of Lecture Notes in Computer Science, pp. 346-360. Springer-Verlag, Berlin, 1998.
-
(1998)
Advances in Cryptology - EUROCRYPT '98, Volume 1403 of Lecture Notes in Computer Science
, vol.1403
, pp. 346-360
-
-
Beaver, D.1
Wool, A.2
-
11
-
-
33746018019
-
-
[Can2] Personal communications
-
[Can2] R. Canetti. Personal communications, 1998.
-
(1998)
-
-
Canetti, R.1
-
12
-
-
33745999488
-
-
[Can3] Manuscript, June 1998. Former (more general) version: Modular composition of multi-party cryptographic protocols, Nov.
-
[Can3] R. Canetti. Security and composition of multi-party cryptographic protocols. Manuscript, June 1998. Former (more general) version: Modular composition of multi-party cryptographic protocols, Nov. 1997.
-
(1997)
Security and Composition of Multi-party Cryptographic Protocols.
-
-
Canetti, R.1
-
14
-
-
84864708144
-
Multiparty computations ensuring privacy of each party's input and correctness of the result
-
[CDG] Springer-Verlag, Berlin
-
[CDG] D. Chaum, I. Damgard, and J. van de Graaf. Multiparty computations ensuring privacy of each party's input and correctness of the result. In Advances in Cryptology -CRYPTO '87, volume 293 of Lecture Notes in Computer Science, pp. 87-119. Springer-Verlag, Berlin, 1987.
-
(1987)
Advances in Cryptology -CRYPTO '87, Volume 293 of Lecture Notes in Computer Science
, vol.293
, pp. 87-119
-
-
Chaum, D.1
Damgard, I.2
Van De Graaf, J.3
-
16
-
-
0029723583
-
Adaptively secure multiparty computation
-
[CFGN] Nov.
-
[CFGN] R. Canetti, U. Feige, O. Goldreich, and M. Naor. Adaptively secure multiparty computation. In Proc. 2&th ACM Symposium on the Tlieory of Computing (STOC), pp. 639-648, Nov. 1996.
-
(1996)
Proc. 2&th ACM Symposium on the Tlieory of Computing (STOC)
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
17
-
-
77951106449
-
Multi-authority secret-ballot elections with linear work
-
[CFSY] IACR/Springer-Verlag, Berlin, May
-
[CFSY] R. Cramer, M. K. Franklin, B. Schoenmakers, and M. Yung. Multi-authority secret-ballot elections with linear work. In Advances in Cryplology -EUROCRYPT '96, volume 1070 of Lecture Notes in Computer Science, pp. 72-83. IACR/Springer-Verlag, Berlin, May 1996.
-
(1996)
Advances in Cryplology -EUROCRYPT '96, Volume 1070 of Lecture Notes in Computer Science
, vol.1070
, pp. 72-83
-
-
Cramer, R.1
Franklin, M.K.2
Schoenmakers, B.3
Yung, M.4
-
19
-
-
0029541045
-
Private information retrieval
-
[CGKS] Oct.
-
[CGKS] B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In Proc. 36//i IEEE Symposium on the Foundations of Computer Science (FOCS), pp. 41-51, Oct. 1995.
-
(1995)
Proc. 36//i IEEE Symposium on the Foundations of Computer Science (FOCS)
, pp. 41-51
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
20
-
-
84957649042
-
Committed oblivious transfer and private multi-party computation
-
[CGT] Springer-Verlag, Berlin
-
[CGT] C. Crépeau, J. van de Graaf, and A. Tapp. Committed oblivious transfer and private multi-party computation. In Advances in Cryptology-CRYPTO '95, volume 963 of Lecture Notes in Computer Science, pp. 110-123. Springer-Verlag, Berlin, 1995.
-
(1995)
Advances in Cryptology-CRYPTO '95, Volume 963 of Lecture Notes in Computer Science
, vol.963
, pp. 110-123
-
-
Crépeau, C.1
Van De Graaf, J.2
Tapp, A.3
-
23
-
-
0024860209
-
A zero-one law for Boolean privacy. in
-
[CK]
-
[CK] B. Chor and E. Kushilevitz. A zero-one law for Boolean privacy. In Proc. 2lst ACM Symposium on the Theory of Computing (STOQ, pp. 62-72, 1989.
-
(1989)
Proc.
, vol.2
, pp. 62-72
-
-
Chor, B.1
Kushilevitz, E.2
-
24
-
-
0030652586
-
Randomness vs. fault-tolerance. in
-
[CKOR] Aug.
-
[CKOR] R. Canetti, E. Kushilevitz, R. Ostrovsky, and A. Rosen. Randomness vs. fault-tolerance. In Proc. 16//I ACM Symposium on Principles of Distributed Computing (PODC), pp. 35-44, Aug. 1997.
-
(1997)
Proc. 16//I ACM Symposium on Principles of Distributed Computing (PODC)
, pp. 35-44
-
-
Canetti, R.1
Kushilevitz, E.2
Ostrovsky, R.3
Rosen, A.4
-
25
-
-
0027961556
-
How to share a function securely
-
[dDFY]
-
[dDFY] A. de Santis, Y. Desmedt, Y. Frankel, and M. Yung. How to share a function securely. In Proc. 26th ACM Symposium on the Theory of Computing (STOQ, pp. 522-533, 1994.
-
(1994)
Proc. 26th ACM Symposium on the Theory of Computing STOQ
, pp. 522-533
-
-
De Santis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
26
-
-
44449153600
-
Trading correctness for privacy in unconditional multi-party computation
-
[FHM1] Springer-Verlag, Berlin, Corrected version available on-line.
-
[FHM1] M. Fitzi, M. Hirt, and U. Maurer. Trading correctness for privacy in unconditional multi-party computation. In Advances in Cryptology-CRYPTO '98, volume 1462 of Lecture Notes in Computer Science, pp. 121-136. Springer-Verlag, Berlin, 1998. Corrected version available on-line.
-
(1998)
Advances in Cryptology-CRYPTO '98, Volume 1462 of Lecture Notes in Computer Science
, vol.1462
, pp. 121-136
-
-
Fitzi, M.1
Hirt, M.2
Maurer, U.3
-
27
-
-
33746018016
-
General adversaries in unconditional multi-party computation. in
-
[FHM2] Springer-Verlag, Berlin
-
[FHM2] M. Fitzi, M. Hirt, and U. Maurer. General adversaries in unconditional multi-party computation. In Advances in Cryptology -ASIACRYPT ' 99, volume 1716 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1999.
-
(1999)
Advances in Cryptology -ASIACRYPT ' 99, Volume 1716 of Lecture Notes in Computer Science
, vol.1716
-
-
Fitzi, M.1
Hirt, M.2
Maurer, U.3
-
29
-
-
0027986369
-
A minimal model for secure computation
-
[FKN]
-
[FKN] U. Feige, J. Kilian, and M. Naor. A minimal model for secure computation. In Proc, 26th ACM Symposium on the Theory of Computing (STOC), pp. 554-563, 1994.
-
(1994)
Proc, 26th ACM Symposium on the Theory of Computing (STOC)
, pp. 554-563
-
-
Feige, U.1
Kilian, J.2
Naor, M.3
-
31
-
-
0031210863
-
An optimal probabilistic protocol for synchronous Byzantine agreement
-
[FM2] Aug.
-
[FM2] P. Feldman and S. Micali. An optimal probabilistic protocol for synchronous Byzantine agreement. SIAM Journal on Computing, 26(4):873-933, Aug. 1997.
-
(1997)
SIAM Journal on Computing
, vol.26
, Issue.4
, pp. 873-933
-
-
Feldman, P.1
Micali, S.2
-
32
-
-
84947907604
-
Efficient Byzantine agreement secure against general adversaries
-
[FM3] Springer-Verlag, Berlin, Sept.
-
[FM3] M. Fitzi and U. Maurer. Efficient Byzantine agreement secure against general adversaries. In Dis-tributed Computing -DISC '98, volume 1499 of Lecture Notes in Computer Science, pp. 134-148. Springer-Verlag, Berlin, Sept. 1998.
-
(1998)
Dis-tributed Computing -DISC '98, Volume 1499 of Lecture Notes in Computer Science
, vol.1499
, pp. 134-148
-
-
Fitzi, M.1
Maurer, U.2
-
33
-
-
0001710760
-
The design and implementation of a secure auction service
-
[FR] May
-
[FR] M. K. Franklin and M. K. Reiter. The design and implementation of a secure auction service. IEEE Transactions on Sofm-are Engineering, 22(5):302-312, May 1996.
-
(1996)
IEEE Transactions on Sofm-are Engineering
, vol.22
, Issue.5
, pp. 302-312
-
-
Franklin, M.K.1
Reiter, M.K.2
-
36
-
-
84976655650
-
Cryptographic computation: Secure fault-tolerant protocols and the public-key model
-
[GHY] Springer-Verlag, Berlin
-
[GHY] Z. GaliI, S. Haber, and M. Yung. Cryptographic computation: secure fault-tolerant protocols and the public-key model. In Advances in Cryptology -CRYPTO '87, volume 293 of Lecture Notes in Computer Science, pp. 135-155. Springer-Verlag, Berlin, 1987.
-
(1987)
Advances in Cryptology -CRYPTO '87, Volume 293 of Lecture Notes in Computer Science
, vol.293
, pp. 135-155
-
-
Galii, Z.1
Haber, S.2
Yung, M.3
-
37
-
-
84947441722
-
Robust and efficient sharing of RSA functions
-
[GJKR1] In N. Koblitz, editor, Springer-Verlag, Berlin, Aug.
-
[GJKR1] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust and efficient sharing of RSA functions. In N. Koblitz, editor, Advances in Cryptology -CRYPTO '96, volume 1109 of Lecture Notes in Computer Science, pp. 157-172. Springer-Verlag, Berlin, Aug. 1996.
-
(1996)
Advances in Cryptology -CRYPTO '96, Volume 1109 of Lecture Notes in Computer Science
, vol.1109
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
38
-
-
84947926543
-
Robust threshold DSS signatures. in U. Maurer, editor
-
[GJKR2] Springer-Verlag, Berlin, May
-
[GJKR2] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. In U. Maurer, editor, Advances in Cryptology -EUROCRYPT '96, volume 1070 of Lecture Notes in Computer Science, pp. 354-371. Springer-Verlag, Berlin, May 1996.
-
(1996)
Advances in Cryptology -EUROCRYPT '96, Volume 1070 of Lecture Notes in Computer Science
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
42
-
-
0023543848
-
Secret sharing scheme realizing general access structure. i
-
[ISN] IEEE, New York
-
[ISN] M. Ito, A. Saito, and T. Nishizeki. Secret sharing scheme realizing general access structure. I Proceedings IEEE Globecom '81, pp. 99-102. IEEE, New York, 1987.
-
(1987)
Proceedings IEEE Globecom '81
, pp. 99-102
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
45
-
-
84976699318
-
The Byzantine generals problem
-
[LSP] July
-
[LSP] L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. ACM Transactions o Programming Languages and Systems, 4(3):382-401, July 1982.
-
(1982)
ACM Transactions O Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
46
-
-
84974655726
-
Secure computation
-
[MR] Springer-Verlag, Berlin
-
[MR] S. Micali and P. Rogaway. Secure computation. In Advances in Cryptohgy -CRYPTO '91, volum 576 of Lecture Notes in Computer Science, pp. 392-4104. Springer-Verlag, Berlin, 1991.
-
(1991)
Advances in Cryptohgy -CRYPTO '91, Volum 576 of Lecture Notes in Computer Science
, vol.576
, pp. 392-4104
-
-
Micali, S.1
Rogaway, P.2
-
48
-
-
84976810569
-
Reaching agreement in the presence of faults
-
[PSL] Apr.
-
[PSL] M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. Journal of th ACM, 27(2):228-234, Apr. 1980.
-
(1980)
Journal of Th ACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
49
-
-
0028542745
-
Robust sharing of secrets when the dealer is honest or cheating
-
[Rab] Nov.
-
[Rab] T. Rabin. Robust sharing of secrets when the dealer is honest or cheating. Journal of the ACM 41(6):1089-1109, Nov. 1994.
-
(1994)
Journal of the ACM
, vol.41
, Issue.6
, pp. 1089-1109
-
-
Rabin, T.1
-
52
-
-
0020312165
-
Protocols for secure computations
-
[Yao] IEEE, New York
-
[Yao] A. C. Yao. Protocols for secure computations. In Proc. 23rd IEEE Symposium on the Foundation of Computer Science (FOCS), pp. 160-164. IEEE, New York, 1982.
-
(1982)
Proc.
, vol.23
, pp. 160-164
-
-
Yao, A.C.1
|