-
1
-
-
0026172266
-
Statistical zero-knowledge languages can be recognized in two rounds
-
W. Aiello and J. Hastad. Statistical zero-knowledge languages can be recognized in two rounds. Journal of Computer and Systems Sciences, 42(3):327-345, 1991.
-
(1991)
Journal of Computer and Systems Sciences
, vol.42
, Issue.3
, pp. 327-345
-
-
Aiello, W.1
Hastad, J.2
-
2
-
-
84957064831
-
The all-or-nothing nature of two-party secure computation
-
LNCS 1666. Springer, Berlin
-
A. Beimel, T. Malkin, and S. Micali. The all-or-nothing nature of two-party secure computation. In CRYPTO '99, pages 80-97. LNCS 1666. Springer, Berlin, 1999.
-
(1999)
CRYPTO '99
, pp. 80-97
-
-
Beimel, A.1
Malkin, T.2
Micali, S.3
-
3
-
-
85032877753
-
Non-interactive oblivious transfer and applications
-
LNCS 435. Springer, Berlin
-
M. Bellare and S. Micali. Non-interactive oblivious transfer and applications. In CRYPTO '89, pages 547-557. LNCS 435. Springer, Berlin, 1989.
-
(1989)
CRYPTO '89
, pp. 547-557
-
-
Bellare, M.1
Micali, S.2
-
4
-
-
84898960610
-
Completeness theorems for non-cryptographic faulttolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic faulttolerant distributed computation. In Proc. 20th STOC, pages 1-10, 1988.
-
(1988)
Proc. 20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
84969361843
-
Practical quantum oblivious transfer protocols
-
LNCS 576. Springer, Berlin
-
C.H. Bennett, G. Brassard, C. Crepeau, and M.H. Skubiszewska. Practical quantum oblivious transfer protocols. In CRYPTO '91, pages 351-366. LNCS 576. Springer, Berlin, 1992.
-
(1992)
CRYPTO '91
, pp. 351-366
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Skubiszewska, M.H.4
-
6
-
-
0023646410
-
Does co-np have short interactive proofs?
-
R. Boppana, J. Hastad, and S. Zachos. Does co-np have short interactive proofs? Information Processing Letters, 25(2):127-132, 1987.
-
(1987)
Information Processing Letters
, vol.25
, Issue.2
, pp. 127-132
-
-
Boppana, R.1
Hastad, J.2
Zachos, S.3
-
7
-
-
33746383020
-
Oblivious transfer with a memory-bound receiver
-
C. Cachin, C. Crepeau, and J. Marcil. Oblivious transfer with a memory-bound receiver. In Proc. 39th FOCS, pages 493-502, 1995.
-
(1995)
Proc. 39th FOCS
, pp. 493-502
-
-
Cachin, C.1
Crepeau, C.2
Marcil, J.3
-
8
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143-202, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
9
-
-
32844458303
-
On the limitations of universally composable two-party computation without set-up assumptions
-
R. Canetti, E. Kushilevitz, and Y. Lindell. On the limitations of universally composable two-party computation without set-up assumptions. Journal of Cryptology, 19(2):135-167, 2006.
-
(2006)
Journal of Cryptology
, vol.19
, Issue.2
, pp. 135-167
-
-
Canetti, R.1
Kushilevitz, E.2
Lindell, Y.3
-
10
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
D. Chaum, C. Crepeau, and I. Damgard. Multiparty unconditionally secure protocols. In Proc. 20th STOC, pages 11-19, 1988.
-
(1988)
Proc. 20th STOC
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
12
-
-
33749562141
-
-
Preliminary version
-
Preliminary version in Proc 21st STOC.
-
Proc 21st STOC
-
-
-
13
-
-
85030121757
-
Equivalence between two flavours of oblivious transfers
-
LNCS 293. Springer, Berlin
-
C. Crepeau. Equivalence between two flavours of oblivious transfers. In CRYPTO '87, pages 350-354. LNCS 293. Springer, Berlin, 1987.
-
(1987)
CRYPTO '87
, pp. 350-354
-
-
Crepeau, C.1
-
14
-
-
0024132071
-
Achieving oblivious transfer using weakened security assumptions
-
C. Crepeau and J. Kilian. Achieving oblivious transfer using weakened security assumptions. In Proc. 29th FOCS, pages 42-52, 1988.
-
(1988)
Proc. 29th FOCS
, pp. 42-52
-
-
Crepeau, C.1
Kilian, J.2
-
15
-
-
84957697395
-
On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
-
LNCS 1592. Springer, Berlin
-
I. Damgard, J. Kilian, and L. Salvail. On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions. In Eurocrypt '99, pages 56-73. LNCS 1592. Springer, Berlin, 1999.
-
(1999)
Eurocrypt '99
, pp. 56-73
-
-
Damgard, I.1
Kilian, J.2
Salvail, L.3
-
16
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
17
-
-
84880899701
-
Minimal complete primitives for secure multi-party computation
-
LNCS 2139. Springer, Berlin
-
M. Fitzi, J.A. Garay, U.M. Maurer, and R. Ostrovsky. Minimal complete primitives for secure multi-party computation. In CRYPTO '01, pages 80-100. LNCS 2139. Springer, Berlin, 2001.
-
(2001)
CRYPTO '01
, pp. 80-100
-
-
Fitzi, M.1
Garay, J.A.2
Maurer, U.M.3
Ostrovsky, R.4
-
18
-
-
0003210004
-
The complexity of perfect zero-knowledge
-
(editor S. Micali). Volume 5 of Advances in Computing Research. JAI Press, Greenwich, CT
-
L. Fortnow. The complexity of perfect zero-knowledge. In Randomness and Computation (editor S. Micali), pages 327-343. Volume 5 of Advances in Computing Research. JAI Press, Greenwich, CT, 1989.
-
(1989)
Randomness and Computation
, pp. 327-343
-
-
Fortnow, L.1
-
19
-
-
0034497243
-
The relationship between public key encryption and oblivious transfer
-
Y. Gertner, S. Kannan, T. Malkin, O. Reingold, and M. Viswanathan. The relationship between public key encryption and oblivious transfer. In Proc. 41st FOCS, pages 325-335, 2000.
-
(2000)
Proc. 41st FOCS
, pp. 325-335
-
-
Gertner, Y.1
Kannan, S.2
Malkin, T.3
Reingold, O.4
Viswanathan, M.5
-
22
-
-
0024868772
-
A hard-core predicate for all one-way functions
-
O. Goldreich and L.A. Levin. A hard-core predicate for all one-way functions. In Proc. 21st STOC, pages 25-32, 1989.
-
(1989)
Proc. 21st STOC
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.A.2
-
23
-
-
0023545076
-
How to play any mental game - A completeness theorem for protocols with honest majority
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game - a completeness theorem for protocols with honest majority. In Proc. 19th STOC, pages 218-229, 1987.
-
(1987)
Proc. 19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
24
-
-
71149116146
-
Proofs that yield nothing but their validity, or all languages in np have zero-knowledge proof systems
-
O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity, or all languages in np have zero-knowledge proof systems. Journal of the ACM, 38:691-729, 1991.
-
(1991)
Journal of the ACM
, vol.38
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
25
-
-
33749567437
-
-
Electronic Colloquium on Computational Complexity, Report TR95-050
-
O. Goldreich, N. Nisan, and A. Wigderson. On Yao's XOR-lemma. Electronic Colloquium on Computational Complexity, Report TR95-050, 1995. Available at http://eccc.hpi-web.de/eccc/.
-
(1995)
On Yao's XOR-lemma
-
-
Goldreich, O.1
Nisan, N.2
Wigderson, A.3
-
26
-
-
85032194875
-
How to solve any protocol problem - An efficiency improvement
-
LNCS 293. Springer, Berlin
-
O. Goldreich and R. Vainish. How to solve any protocol problem - an efficiency improvement. In CRYPTO '87, pages 73-86. LNCS 293. Springer, Berlin, 1987.
-
(1987)
CRYPTO '87
, pp. 73-86
-
-
Goldreich, O.1
Vainish, R.2
-
27
-
-
33745999816
-
Player simulation and general adversary structures in perfect multiparty computation
-
M. Hirt and U. Maurer. Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology, 13(1):31-60, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 31-60
-
-
Hirt, M.1
Maurer, U.2
-
28
-
-
0029516814
-
Hard-core distributions for somewhat hard problems
-
R. Impagliazzo. Hard-core distributions for somewhat hard problems. In Proc. 36th FOCS, pages 538-545, 1995.
-
(1995)
Proc. 36th FOCS
, pp. 538-545
-
-
Impagliazzo, R.1
-
29
-
-
0029227950
-
A personal view of average-case complexity
-
IEEE Computer Society Press, Los Alamitos, CA
-
R. Impagliazzo. A personal view of average-case complexity. In Proc. 10th Annual Structure in Complexity Theory Conference, pages 134-147. IEEE Computer Society Press, Los Alamitos, CA, 1995.
-
(1995)
Proc. 10th Annual Structure in Complexity Theory Conference
, pp. 134-147
-
-
Impagliazzo, R.1
-
30
-
-
0024770898
-
One-way functions are essential for complexity based cryptography
-
R. Impagliazzo and M. Luby. One-way functions are essential for complexity based cryptography. In Proc. 30th FOCS, pages 230-235, 1989.
-
(1989)
Proc. 30th FOCS
, pp. 230-235
-
-
Impagliazzo, R.1
Luby, M.2
-
31
-
-
0024866742
-
Limits on the provable consequences of one-way permutations
-
R. Impagliazzo and S. Rudich. Limits on the provable consequences of one-way permutations. In Proc. 21st STOC, pages 44-61, 1989.
-
(1989)
Proc. 21st STOC
, pp. 44-61
-
-
Impagliazzo, R.1
Rudich, S.2
-
32
-
-
33749544524
-
-
Personal communication
-
Y. Ishai. Personal communication, 2004.
-
(2004)
-
-
Ishai, Y.1
-
33
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
J. Kilian. Founding cryptography on oblivious transfer. In Proc. 20th STOC, pages 20-31, 1988.
-
(1988)
Proc. 20th STOC
, pp. 20-31
-
-
Kilian, J.1
-
34
-
-
4544353942
-
A general completeness theorem for two-party games
-
J. Kilian. A general completeness theorem for two-party games. In Proc. 23rd STOC, pages 553-560, 1991.
-
(1991)
Proc. 23rd STOC
, pp. 553-560
-
-
Kilian, J.1
-
35
-
-
0033706604
-
More general completeness theorems for secure two-party computation
-
J. Kilian. More general completeness theorems for secure two-party computation. In Proc. 32nd STOC, pages 316-324, 2000.
-
(2000)
Proc. 32nd STOC
, pp. 316-324
-
-
Kilian, J.1
-
36
-
-
0033725451
-
Reducibility and completeness in private computations
-
J. Kilian, E. Kushilevitz, S. Micali, and R. Ostrovsky. Reducibility and completeness in private computations. SIAM Journal of Computing, 28(4):1189-1208, 2000.
-
(2000)
SIAM Journal of Computing
, vol.28
, Issue.4
, pp. 1189-1208
-
-
Kilian, J.1
Kushilevitz, E.2
Micali, S.3
Ostrovsky, R.4
-
38
-
-
33749555074
-
-
Preliminary version
-
Preliminary version in Proc. 30th FOCS.
-
Proc. 30th FOCS
-
-
-
39
-
-
84968329589
-
Reducibility and completeness in multi-party private computations
-
E. Kushilevitz, S. Micali, and R. Ostrovsky. Reducibility and completeness in multi-party private computations. In Proc. 35th FOCS, pages 478-489, 1994.
-
(1994)
Proc. 35th FOCS
, pp. 478-489
-
-
Kushilevitz, E.1
Micali, S.2
Ostrovsky, R.3
-
40
-
-
51249173191
-
One-way functions and pseudorandom generators
-
L.A. Levin. One-way functions and pseudorandom generators. Combinatorica, 7:357-363, 1987.
-
(1987)
Combinatorica
, vol.7
, pp. 357-363
-
-
Levin, L.A.1
-
41
-
-
84957050617
-
Information-theoretic cryptography
-
LNCS 1666. Springer, Berlin
-
U. Maurer. Information-theoretic cryptography. In CRYPTO '99, pages 47-64. LNCS 1666. Springer, Berlin, 1999.
-
(1999)
CRYPTO '99
, pp. 47-64
-
-
Maurer, U.1
-
42
-
-
0002187139
-
Secure computation
-
LNCS 576. Springer, Berlin
-
S. Micali and P. Rogaway. Secure computation. In CRYPTO '91, pages 392-404. LNCS 576. Springer, Berlin, 1991.
-
(1991)
CRYPTO '91
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
44
-
-
0034140357
-
On relationships between statistical zero-knowledge proofs
-
T. Okamoto. On relationships between statistical zero-knowledge proofs. Journal of Computer and Systems Sciences, 60(1):47-108, 2000.
-
(2000)
Journal of Computer and Systems Sciences
, vol.60
, Issue.1
, pp. 47-108
-
-
Okamoto, T.1
-
47
-
-
0020312165
-
Protocols for secure computations
-
A. C. Yao. Protocols for secure computations. In Proc. 23rd FOCS, pages 160-164, 1982.
-
(1982)
Proc. 23rd FOCS
, pp. 160-164
-
-
Yao, A.C.1
-
48
-
-
0020301290
-
Theory and application of trapdoor functions
-
A. C. Yao. Theory and application of trapdoor functions. In Proc. 23rd FOCS, pages 80-91, 1982.
-
(1982)
Proc. 23rd FOCS
, pp. 80-91
-
-
Yao, A.C.1
-
49
-
-
0022882770
-
How to generate and exchange secrets
-
A. C. Yao. How to generate and exchange secrets. In Proc. 21th FOCS, pages 162-167, 1986.
-
(1986)
Proc. 21th FOCS
, pp. 162-167
-
-
Yao, A.C.1
|