-
1
-
-
33646833311
-
Adaptively secure feldman VSS and applications to universally-composable threshold cryptography
-
LNCS 3152, Springer-Verlag
-
M. Abe and S. Fehr. Adaptively secure feldman VSS and applications to universally-composable threshold cryptography. In Advances in Cryptology CRYPTO, LNCS 3152, pages 317-334. Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology CRYPTO
, pp. 317-334
-
-
Abe, M.1
Fehr, S.2
-
2
-
-
33749582730
-
Protocol initialization for the framework of universal composability
-
B. Barak, Y. Lindell, and T. Rabin. Protocol initialization for the framework of universal composability. Cryptology ePrint Archive, Report 2004/006, 2004. http://eprint.iacr.org/.
-
(2004)
Cryptology EPrint Archive, Report
, vol.2004
, Issue.6
-
-
Barak, B.1
Lindell, Y.2
Rabin, T.3
-
3
-
-
0027188428
-
Asynchronous secure computation
-
ACM Press
-
M. Ben-Or, R. Canetti, and O. Goldreich. Asynchronous secure computation. In ACM STOC'93, pages 52-61. ACM Press, 1993.
-
(1993)
ACM STOC'93
, pp. 52-61
-
-
Ben-Or, M.1
Canetti, R.2
Goldreich, O.3
-
4
-
-
0346342609
-
Resilient-optimal interactive consistency in constant time
-
M. Ben-Or and R. El-Yaniv. Resilient-optimal interactive consistency in constant time. Distributed Computing, 16(4):249-262, 2003.
-
(2003)
Distributed Computing
, vol.16
, Issue.4
, pp. 249-262
-
-
Ben-Or, M.1
El-Yaniv, R.2
-
5
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computations
-
ACM Press
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic fault-tolerant distributed computations. In ACM STOC'88, pages 1-10. ACM Press, 1988.
-
(1988)
ACM STOC'88
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
85008184918
-
Asynchronous secure computations with optimal resilience
-
M. Ben-Or, B. Kelmer, and T. Rabin. Asynchronous secure computations with optimal resilience (extended abstract). In ACM PODC'94, pages 183-192, 1994.
-
(1994)
ACM PODC'94
, pp. 183-192
-
-
Ben-Or, M.1
Kelmer, B.2
Rabin, T.3
-
7
-
-
84880899710
-
Secure and efficient asynchronous broadcast protocols
-
LNCS 2139 Springer-Verlag
-
C. Cachin, K. Kursawe, F. Petzold, and V. Shoup. Secure and efficient asynchronous broadcast protocols. In Advances in Cryptology - CRYPTO, LNCS 2139, pages 524-541. Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology - CRYPTO
, pp. 524-541
-
-
Cachin, C.1
Kursawe, K.2
Petzold, F.3
Shoup, V.4
-
8
-
-
28144462281
-
Universally composable security: A new paradigm for cryptographic protocols
-
Report 2000/067, Cryptology ePrint Archive, January
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. Report 2000/067, Cryptology ePrint Archive, January 2005. Full version of that in IEEE Symposium on Foundations of Computer Science (FOGS'01).
-
(2005)
IEEE Symposium on Foundations of Computer Science (FOGS'01)
-
-
Canetti, R.1
-
11
-
-
0027313816
-
Fast asynchronous Byzantine agreement with optimal resilience
-
ACM Press
-
R. Canetti and T. Rabin. Fast asynchronous Byzantine agreement with optimal resilience (extended abstract). In ACM STOC'93, pages 42-51. ACM Press, 1993.
-
(1993)
ACM STOC'93
, pp. 42-51
-
-
Canetti, R.1
Rabin, T.2
-
12
-
-
0022199386
-
Verifiable secret sharing and achieving simultaneity in the presence of faults
-
IEEE CS
-
B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. Verifiable secret sharing and achieving simultaneity in the presence of faults. In IEEE Symposium on Foundations of Computer Science (FOCS'85), pages 383-395. IEEE CS, 1985.
-
(1985)
IEEE Symposium on Foundations of Computer Science (FOCS'85)
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
14
-
-
84957717648
-
Efficient multiparty computations secure against an adaptive adversary
-
Springer-Verlag
-
R. Cramer, I. Damgård, S. Dziembowski, M. Hirt, and T. Rabin. Efficient multiparty computations secure against an adaptive adversary. In Advances in Cryptology - EUROCRYPT'99, pages 311-326. Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology - EUROCRYPT'99
, pp. 311-326
-
-
Cramer, R.1
Damgård, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
15
-
-
35248844164
-
Universally composable efficient multiparty computation from threshold homomorphic encryption
-
LNCS 2729, Springer-Verlag
-
I. Damgård and J. B. Nielsen. Universally composable efficient multiparty computation from threshold homomorphic encryption. In Advances in Cryptology -CRYPTO, LNCS 2729, pages 247-264. Springer-Verlag, 2003.
-
(2003)
Advances in Cryptology - CRYPTO
, pp. 247-264
-
-
Damgård, I.1
Nielsen, J.B.2
-
16
-
-
84974602942
-
Improved non-committing encryption schemes based on a general complexity assumption
-
LNCS 1880, Springer-Verlag
-
I. Damgård and J.B. Nielsen. Improved non-committing encryption schemes based on a general complexity assumption. In Advances in Cryptology - CRYPTO, LNCS 1880, pages 432-450. Springer-Verlag, 2000.
-
(2000)
Advances in Cryptology - CRYPTO
, pp. 432-450
-
-
Damgård, I.1
Nielsen, J.B.2
-
17
-
-
0343337504
-
Nonmalleable cryptography
-
April
-
D. Dolev, C. Dwork, and M. Naor. Nonmalleable cryptography. SIAM Journal on Computing, 30(2):391-437, April 2001.
-
(2001)
SIAM Journal on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
18
-
-
0031210863
-
An optimal probabilistic protocol for synchronous byzantine agreement
-
P. Feldman and S. Micali. An optimal probabilistic protocol for synchronous byzantine agreement. SIAM Journal on Computing, 26(4):873-933, 1997.
-
(1997)
SIAM Journal on Computing
, vol.26
, Issue.4
, pp. 873-933
-
-
Feldman, P.1
Micali, S.2
-
20
-
-
71149116146
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
-
July
-
O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. Journal of the ACM, 38(3):691-729, July 1991.
-
(1991)
Journal of the ACM
, vol.38
, Issue.3
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
22
-
-
32344443727
-
Simultaneous broadcast revisited
-
ACM Press
-
A. Hevia and D. Micciancio. Simultaneous broadcast revisited. In ACM PODC'05, pages 324-333. ACM Press, 2005.
-
(2005)
ACM PODC'05
, pp. 324-333
-
-
Hevia, A.1
Micciancio, D.2
-
23
-
-
24944494113
-
Cryptographic asynchronous multiparty computation with optimal resilience
-
LNCS 3494,. Springer-Verlag
-
M. Hirt, J. B. Nielsen, and B. Przydatek. Cryptographic asynchronous multiparty computation with optimal resilience (extended abstract). In Advances in Cryptology - EUROCRYPT'05, LNCS 3494, pages 322-340. Springer-Verlag, 2005.
-
(2005)
Advances in Cryptology - EUROCRYPT'05
, pp. 322-340
-
-
Hirt, M.1
Nielsen, J.B.2
Przydatek, B.3
-
25
-
-
84976699318
-
The Byzantine generals problem
-
July
-
L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3):382-401, July 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
26
-
-
0036038649
-
On the composition of authenticated byzantine agreement
-
ACM Press
-
Y. Lindell, A. Lysyanskaya, and T. Rabin. On the composition of authenticated byzantine agreement. In ACM STOC'02, pages 514-523. ACM Press, 2002.
-
(2002)
ACM STOC'02
, pp. 514-523
-
-
Lindell, Y.1
Lysyanskaya, A.2
Rabin, T.3
-
27
-
-
0036957660
-
Sequential composition of protocols without simultaneous termination
-
Y. Lindell, A. Lysyanskaya, and T. Rabin. Sequential composition of protocols without simultaneous termination. In ACM PODC'02, pages 203-212, 2002.
-
(2002)
ACM PODC'02
, pp. 203-212
-
-
Lindell, Y.1
Lysyanskaya, A.2
Rabin, T.3
-
29
-
-
0348228510
-
Collective coin tossing without assumptions nor broadcasting
-
LNCS 537
-
S. Micali and T. Rabin. Collective coin tossing without assumptions nor broadcasting. In Advances in Cryptology - CRYPTO, LNCS 537, pages 253-266, 1990.
-
(1990)
Advances in Cryptology - CRYPTO
, pp. 253-266
-
-
Micali, S.1
Rabin, T.2
-
31
-
-
84976810569
-
Reaching agreements in the presence of faults
-
April
-
M. Pease, R. Shostak, and L. Lamport. Reaching agreements in the presence of faults. Journal of the ACM, 27(2):228-234, April 1980.
-
(1980)
Journal of the ACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
32
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
IEEE CS
-
B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In IEEE Symposium on Security and Privacy (S&P-01), pages 184-201. IEEE CS, 2001.
-
(2001)
IEEE Symposium on Security and Privacy (S&P-01)
, pp. 184-201
-
-
Pfitzmann, B.1
Waidner, M.2
-
33
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
ACM Press
-
T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In ACM STOC'89, pages 73-85. ACM Press, 1989.
-
(1989)
ACM STOC'89
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
|