-
2
-
-
35248855697
-
Constant-round coin-tossing with a man in the middle
-
References are to the preliminary full version, available from the author's web page
-
B. Barak. Constant-round coin-tossing with a man in the middle. In 43rd IEEE Symposium on the Foundations of Computer Science, 2002. References are to the preliminary full version, available from the author's web page.
-
(2002)
43rd IEEE Symposium on the Foundations of Computer Science
-
-
Barak, B.1
-
4
-
-
85029542707
-
Foundations of secure interactive computing
-
Advances in Cryptology - CRYPTO '91, IACR, Springer-Verlag, Aug.
-
D. Beaver. Foundations of secure interactive computing. In Advances in Cryptology - CRYPTO '91, volume 576 of Lecture Notes in Computer Science, pages 377-391. IACR, Springer-Verlag, Aug. 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.576
, pp. 377-391
-
-
Beaver, D.1
-
5
-
-
85014508412
-
Multiparty computation with faulty majority
-
Advances in Cryptology - CRYPTO '89, IACR, Springer-Verlag, Aug.
-
D. Beaver and S. Goldwasser. Multiparty computation with faulty majority. In Advances in Cryptology - CRYPTO '89, volume 435 of Lecture Notes in Computer Science, pages 589-590. IACR, Springer-Verlag, Aug. 1989.
-
(1989)
Lecture Notes in Computer Science
, vol.435
, pp. 589-590
-
-
Beaver, D.1
Goldwasser, S.2
-
8
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and composition of multiparty cryptographic protocols. J. Cryptology, 13(1):143-202, 2000.
-
(2000)
J. Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
9
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Las Vegas, Nevada, Oct. IEEE
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In 42nd IEEE Symposium on the Foundations of Computer Science, pages 136-147, Las Vegas, Nevada, Oct. 2001. IEEE.
-
(2001)
42nd IEEE Symposium on the Foundations of Computer Science
, pp. 136-147
-
-
Canetti, R.1
-
10
-
-
84880897758
-
Universally composable commitments
-
Advances in Cryptology - CRYPTO 2001, IACR, Springer
-
R. Canetti and M. Fischlin. Universally composable commitments. In Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 19-40. IACR, Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
11
-
-
0036038991
-
Universally composable two-party and multi-party secure computation
-
Montréal, Québec, May ACM
-
R. Canetti, Y. Lindell, R. Ostrovsky, and A. Sahai. Universally composable two-party and multi-party secure computation. In 34th ACM Symposium on the Theory of Computing, pages 494-503, Montréal, Québec, May 2002. ACM.
-
(2002)
34th ACM Symposium on the Theory of Computing
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
14
-
-
0012610677
-
Limits on the security of coin flips when half the processors are faulty
-
R. Cleve. Limits on the security of coin flips when half the processors are faulty. In 18th ACM Symposium on the Theory of Computing, pages 364-369, 1986.
-
(1986)
18th ACM Symposium on the Theory of Computing
, pp. 364-369
-
-
Cleve, R.1
-
15
-
-
84880872502
-
Secure distributed linear algebra in a constant number of rounds
-
Advances in Cryptology - CRYPTO 2001, IACR, Springer
-
R. Cramer and I. Damgård. Secure distributed linear algebra in a constant number of rounds. In Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science. IACR, Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
-
-
Cramer, R.1
Damgård, I.2
-
17
-
-
0343337504
-
Nonmalleable cryptography
-
D. Dolev, C. Dwork, and M. Naor. Nonmalleable cryptography. SIAM J. Computing, 30(2):391-437, 2000.
-
(2000)
SIAM J. Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
18
-
-
0001683636
-
Authenticated algorithms for byzantine agreement
-
D. Dolev and H. Strong. Authenticated algorithms for byzantine agreement. SIAM J. Computing, 12(4):656-666, 1983.
-
(1983)
SIAM J. Computing
, vol.12
, Issue.4
, pp. 656-666
-
-
Dolev, D.1
Strong, H.2
-
19
-
-
84976826800
-
Zero knowledge proofs of knowledge in two rounds
-
Advances in Cryptology - CRYPTO '89, IACR, Springer-Verlag, Aug.
-
U. Feige and A. Shamir. Zero knowledge proofs of knowledge in two rounds. In Advances in Cryptology - CRYPTO '89, volume 435 of Lecture Notes in Computer Science, pages 526-544. IACR, Springer-Verlag, Aug. 1989.
-
(1989)
Lecture Notes in Computer Science
, vol.435
, pp. 526-544
-
-
Feige, U.1
Shamir, A.2
-
20
-
-
0036954542
-
Detectable Byzantine agreement secure against faulty majorities
-
M. Fitzi, D. Gottesman, M. Hirt, T. Holenstein, and A. Smith. Detectable Byzantine agreement secure against faulty majorities. In 21st ACM Symposium on Principles of Distributed Computing, pages 118-126, 2002.
-
(2002)
21st ACM Symposium on Principles of Distributed Computing
, pp. 118-126
-
-
Fitzi, M.1
Gottesman, D.2
Hirt, M.3
Holenstein, T.4
Smith, A.5
-
24
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
ACM, May
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In 19th ACM Symposium on the Theory of Computing, pages 218-229. ACM, May 1987.
-
(1987)
19th ACM Symposium on the Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
25
-
-
0028676264
-
Definitions and properties of zero-knowledge proof systems
-
O. Goldreich and Y. Oren. Definitions and properties of zero-knowledge proof systems. J. Cryptology, 7(1):1-32, 1994.
-
(1994)
J. Cryptology
, vol.7
, Issue.1
, pp. 1-32
-
-
Goldreich, O.1
Oren, Y.2
-
26
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
Advances in Cryptology - CRYPTO '90, Springer-Verlag, Aug.
-
S. Goldwasser and L. A. Levin. Fair computation of general functions in presence of immoral majority. In Advances in Cryptology - CRYPTO '90, volume 537 of Lecture Notes in Computer Science, pages 77-93. Springer-Verlag, Aug. 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.537
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.A.2
-
28
-
-
0034507841
-
Randomizing polynomials: A new representation with applications to round-efficient secure computation
-
Redondo Beach, CA, Nov. IEEE
-
Y. Ishai and E. Kushilevitz. Randomizing polynomials: A new representation with applications to round-efficient secure computation. In 41nd IEEE Symposium on the Foundations of Computer Science, Redondo Beach, CA, Nov. 2000. IEEE.
-
(2000)
41nd IEEE Symposium on the Foundations of Computer Science
-
-
Ishai, Y.1
Kushilevitz, E.2
-
29
-
-
0033725451
-
Reducibility and completeness in private computations
-
J. Kilian, E. Kushilevitz, S. Micali, and R. Ostrovsky. Reducibility and completeness in private computations. SIAM J. Computing, 29(4), 2000.
-
(2000)
SIAM J. Computing
, vol.29
, Issue.4
-
-
Kilian, J.1
Kushilevitz, E.2
Micali, S.3
Ostrovsky, R.4
-
30
-
-
35048833033
-
Parallel coin-tossing and constant-round secure two-party computation
-
Advances in Cryptology - CRYPTO 2001, IACR, Springer
-
Y. Lindell. Parallel coin-tossing and constant-round secure two-party computation. In Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 171-189. IACR, Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 171-189
-
-
Lindell, Y.1
-
31
-
-
84974655726
-
Secure computation
-
Advances in Cryptology - CRYPTO '91, IACR, Springer-Verlag, Aug.
-
S. Micali and P. Rogaway. Secure computation. In Advances in Cryptology - CRYPTO '91, volume 576 of Lecture Notes in Computer Science, pages 392-404. IACR, Springer-Verlag, Aug. 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.576
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
32
-
-
0141544069
-
Perfect zero-knowledge arguments for np using any one-way permutation
-
M. Naor, R. Ostrovsky, R. Venkatesan, and M. Yung. Perfect zero-knowledge arguments for np using any one-way permutation. J. Cryptology, 11(2), 1998.
-
(1998)
J. Cryptology
, vol.11
, Issue.2
-
-
Naor, M.1
Ostrovsky, R.2
Venkatesan, R.3
Yung, M.4
|