메뉴 건너뛰기




Volumn 4, Issue 2, 1991, Pages 75-122

Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority

Author keywords

Distributed computing; Fault tolerance; Proof systems; Secret sharing; Zero knowledge

Indexed keywords


EID: 33746365751     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/BF00196771     Document Type: Article
Times cited : (145)

References (31)
  • 2
    • 0024940038 scopus 로고
    • Non-Cryptographic Fault-Tolerant Computing in a Constant Expected Number of Rounds of Interaction
    • ACM, New York
    • (1989) Proc. PODC , pp. 201-209
    • Bar-Ilan, J.1    Beaver, D.2
  • 4
    • 84934250610 scopus 로고    scopus 로고
    • D. Beaver. Perfect Privacy for Two-Party Protocols. Proc. DIMACS Workshop on Distributed Computing and Cryptography, Princeton, NJ, October, 1989, J. Feigenbaum, M. Merritt (eds.). Preliminary version in Technical Report TR-11-89, Harvard University.
  • 5
    • 84934250607 scopus 로고    scopus 로고
    • D. Beaver. Formal Definitions for Secure Distributed Protocols Proc. DIMACS Workshop on Distributed Computing and Cryptography, Princeton, NJ, October, 1989, J. Feigenbaum, M. Merritt (eds.).
  • 6
    • 84934248598 scopus 로고    scopus 로고
    • D. Beaver. Security, Fault Tolerance, and Communication Complexity in Distributed Systems. Ph.D. Thesis, Harvard University, 1990.
  • 8
    • 84934248580 scopus 로고    scopus 로고
    • D. Beaver, J. Feigenbaum, J. Kilian, P. Rogaway. Cryptographic Applications of Locally Random Reductions. Proc. Crypto 1990. Also appeared as AT&T Bell Laboratories Technical Memorandum, November 15, 1989.
  • 9
    • 84934248579 scopus 로고    scopus 로고
    • D. Beaver, J. Feigenbaum, V. Shoup. Hiding Instances in Zero-Knowledge Proof Systems. Proc. Crypto 1990.
  • 10
    • 84934248577 scopus 로고    scopus 로고
    • D. Beaver, S. Goldwasser. Multiparty Computation with Faulty Marjority. Proc. 30th FOCS, IEEE, New York, 1989, pp. 468–473.
  • 11
    • 84934248575 scopus 로고    scopus 로고
    • D. Beaver, S. Haber, M. Yung. Protocols Secure Against Dynamic Adversaries. In preparation, 1990.
  • 13
    • 84934248584 scopus 로고    scopus 로고
    • J. Benaloh. Verifiable Secret Ballot Elections. Ph.D. Thesis, Yale University, 1987.
  • 22
    • 84934248583 scopus 로고    scopus 로고
    • S. Goldwasser, L. Levin. Fair Computation of General Functions in Presence of Immoral Majority. Proc. Crypto 1990.
  • 25
    • 84934248582 scopus 로고    scopus 로고
    • S. Haber, S. Micali. Personal communication, 1987.
  • 26
    • 84934248571 scopus 로고    scopus 로고
    • J. Kilian, S. Micali, P. Rogaway. The Notion of Secure Computation. Unpublished manuscript, 1990.
  • 28
    • 84934248573 scopus 로고    scopus 로고
    • T. Rabin. Robust Sharing of Secrets When the Dealer is Honest or Cheating. Masters Thesis, Hebrew University, 1988.
  • 30
    • 84934248566 scopus 로고    scopus 로고
    • P. Rogaway. The Round Complexity of Secure Protocols. Ph.D. Thesis, Massachusetts Institute of Technology, 1990.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.