-
1
-
-
33746365751
-
-
Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
-
D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology, pp. 75–122, 1991.
-
(1991)
Journal of Cryptology
, pp. 75-122
-
-
Beaver, D.1
-
2
-
-
84898960610
-
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proc. 20th ACM Symposium on the Theory of Computing (STOC), pp. 1–10, 1988.
-
(1988)
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
85027202957
-
Generalized secret sharing and monotone functions. In Advances in Cryptology — CRYPTO’88
-
J. C. Benaloh and J. Leichter. Generalized secret sharing and monotone functions. In Advances in Cryptology — CRYPTO’88, volume 403 of Lecture Notes in Computer Science. Springer-Verlag, 1988.
-
(1988)
Lecture Notes in Computer Science
, vol.403
-
-
Benaloh, J.C.1
Leichter, J.2
-
6
-
-
84956855518
-
In Advances in Cryp-tology — EUROCRYPT’99
-
Efficient multiparty computations with dishonest minority
-
R. Cramer, I. Damgárd, S. Dziembowski, M. Hirt, and T. Rabin. Efficient multiparty computations with dishonest minority. In Advances in Cryp-tology — EUROCRYPT’99, Lecture Notes in Computer Science, 1999.
-
(1999)
Lecture Notes in Computer Science
-
-
Cramer, R.1
Damgárd, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
7
-
-
84956857740
-
General secure multi-party computation from any linear secret sharing scheme
-
R. Cramer, I. Damgárd, and U. Maurer. General secure multi-party computation from any linear secret sharing scheme. Manuscript, 1999.
-
(1999)
Manuscript
-
-
Cramer, R.1
Damgárd, I.2
Maurer, U.3
-
8
-
-
85032861451
-
The spymasters double-agent problem. In Advances in Cryp-tology — CRYPTO’89
-
D. Chaum. The spymasters double-agent problem. In Advances in Cryp-tology — CRYPTO’89, volume 435 of Lecture Notes in Computer Science, pp. 591–602. Springer-Verlag, 1989.
-
(1989)
Lecture Notes in Computer Science
, vol.435
, pp. 591-602
-
-
Chaum, D.1
-
10
-
-
0027341860
-
-
D. Dolev, C. Dwork, O. Waarts, and M. Yung. Perfectly secure message transmission. Journal of the ACM, 40(1):17–47, Jan. 1993.
-
(1993)
Perfectly Secure Message Transmission. Journalof the ACM
, vol.40
, Issue.1
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
11
-
-
44449153600
-
Trading correctness for privacy in unconditional multi-party computation. In Advances in Cryptology — CRYPTO’98, volume 1462 of
-
M. Fitzi, M. Hirt, and U. Maurer. Trading correctness for privacy in unconditional multi-party computation. In Advances in Cryptology — CRYPTO’98, volume 1462 of Lecture Notes in Computer Science, 1998.
-
(1998)
Lecture Notes in Computer Science
-
-
Fitzi, M.1
Hirt, M.2
Maurer, U.3
-
12
-
-
84947907604
-
Efficient Byzantine agreement secure against general adversaries. In Distributed Computing — DISC’98, volume 1499 of
-
M. Fitzi and U. Maurer. Efficient Byzantine agreement secure against general adversaries. In Distributed Computing — DISC’98, volume 1499 of Lecture Notes in Computer Science, Sept. 1998.
-
(1998)
Lecture Notes in Computer Science
-
-
Fitzi, M.1
Maurer, U.2
-
13
-
-
84976655650
-
Secure fault-tolerant protocols and the public-key model. In Advances in Cryptology — CRYPTO’87
-
Z. Galil, S. Haber, and M. Yung. Cryptographic computation: Secure fault-tolerant protocols and the public-key model. In Advances in Cryptology — CRYPTO’87, volume 293 of Lecture Notes in Computer Science, pp. 135– 155. Springer-Verlag, 1987.
-
(1987)
Lecture Notes in Computer Science
, vol.293
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
14
-
-
0023545076
-
How to play any mental game — a completeness theorem for protocols with honest majority
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game — a completeness theorem for protocols with honest majority. In Proc. 19th ACM Symposium on the Theory of Computing (STOC), pp. 218–229, 1987.
-
(1987)
Proc. 19th acm symposium on the theory
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
15
-
-
0030693496
-
-
Complete characterization of adversaries tolerable in secure multi-party computation
-
M. Hirt and U. Maurer. Complete characterization of adversaries tolerable in secure multi-party computation. In Proc. 16th ACM Symposium on Principles of Distributed Computing (PODC), pp. 25–34, Aug. 1997.
-
(1997)
Proc. 16th acm symposium on principles
, pp. 25-34
-
-
Hirt, M.1
Maurer, U.2
-
16
-
-
0023543848
-
-
Secret sharing scheme realizing general access structure
-
M. Ito, A. Saito, and T. Nishizeki. Secret sharing scheme realizing general access structure. In Proceedings IEEE Globecom’87, pp. 99–102. IEEE, 1987.
-
(1987)
Proceedings IEEE Globecom’87
, pp. 99-102
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
17
-
-
84976699318
-
-
The Byzantine generals problem
-
L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3):382–401, July 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
18
-
-
84956856888
-
The information theoretic case. Manuscript, 1998. Former version: Secure computation, In Advances in Cryptology — CRYPTO’91, volume 576 of Lecture Note in Computer Science, pp. 392–404
-
S. Micali and P. Rogaway. Secure computation: The information theoretic case. Manuscript, 1998. Former version: Secure computation, In Advances in Cryptology — CRYPTO’91, volume 576 of Lecture Note in Computer Science, pp. 392–404, Springer-Verlag, 1991. 237, 238
-
(1991)
Springer-Verlag
, vol.237
, pp. 238
-
-
Micali, S.1
Rogaway, P.2
-
20
-
-
85086950736
-
Multiparty computation unconditionally secure against Q
-
2 adversary structures. Manuscript, July 1998. 235, 244
-
(1998)
Manuscript
, vol.235
, pp. 244
-
-
Smith, A.1
Stiglic, A.2
-
21
-
-
0020312165
-
Protocols for secure computations. In Proc. 23rd IEEE Sympo-sium on the Foundations of Computer Science (FOCS), pp. 160–164
-
A. C. Yao. Protocols for secure computations. In Proc. 23rd IEEE Sympo- sium on the Foundations of Computer Science (FOCS), pp. 160–164. IEEE, 1982. 233
-
(1982)
IEEE
, pp. 233
-
-
Yao, A.C.1
|