-
1
-
-
0035166072
-
How to go beyond the black-box simulation barrier
-
IEEE Computer Society Press, Los Alamitos, CA. pp
-
BARAK, B. 2001. How to go beyond the black-box simulation barrier. In Proceedings of the 42nd Annual Symposium on Fundations of Computer Science. IEEE Computer Society Press, Los Alamitos, CA. pp. 106-115.
-
(2001)
Proceedings of the 42nd Annual Symposium on Fundations of Computer Science
, pp. 106-115
-
-
BARAK, B.1
-
2
-
-
33847174495
-
A note on secure protocol initialization and setup in concurrent settings. Cryptology ePrint Archive
-
Report 2004/006
-
BARAK, B., LINDELL, Y., AND RABIN, T. 2004. A note on secure protocol initialization and setup in concurrent settings. Cryptology ePrint Archive, Report 2004/006.
-
(2004)
-
-
BARAK, B.1
LINDELL, Y.2
RABIN, T.3
-
3
-
-
33746365751
-
Secure multi-party protocols and zero-knowledge proof systems tolerating a faulty minority
-
BEAVER, D. 1991. Secure multi-party protocols and zero-knowledge proof systems tolerating a faulty minority. J. Crypt. 4, 2, 75-122.
-
(1991)
J. Crypt
, vol.4
, Issue.2
, pp. 75-122
-
-
BEAVER, D.1
-
4
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computations
-
ACM, New York, pp
-
BEN-OR, M., GOLDWASSER, S., AND WIGDERSON, A. 1988. Completeness theorems for noncryptographic fault-tolerant distributed computations. In Proceedings of the 20th Annual Symposium on Theory of Computing. ACM, New York, pp. 1-10.
-
(1988)
Proceedings of the 20th Annual Symposium on Theory of Computing
, pp. 1-10
-
-
BEN-OR, M.1
GOLDWASSER, S.2
WIGDERSON, A.3
-
5
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
CANETTI, R. 2000. Security and composition of multiparty cryptographic protocols. J. Crypt. 13, 1, 143-202.
-
(2000)
J. Crypt
, vol.13
, Issue.1
, pp. 143-202
-
-
CANETTI, R.1
-
6
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
IEEE Computer Society Press, Los Alamitos, CA. pp
-
CANETTI, R. 2001. Universally composable security: A new paradigm for cryptographic protocols. In Proceedings of the 42nd Annual Symposium on Fundations of Computer Science. IEEE Computer Society Press, Los Alamitos, CA. pp. 136-145.
-
(2001)
Proceedings of the 42nd Annual Symposium on Fundations of Computer Science
, pp. 136-145
-
-
CANETTI, R.1
-
7
-
-
0034830279
-
Black-box concurrent zero-knowledge requires Ω̃(log n) rounds
-
ACM, New York, pp
-
CANETTI, R., KILIAN, J., PETRANK, E., AND ROSEN, A. 2001. Black-box concurrent zero-knowledge requires Ω̃(log n) rounds. In Proceedings of the 33rd Annual Symposium on Theory of Computing. ACM, New York, pp. 570-579.
-
(2001)
Proceedings of the 33rd Annual Symposium on Theory of Computing
, pp. 570-579
-
-
CANETTI, R.1
KILIAN, J.2
PETRANK, E.3
ROSEN, A.4
-
8
-
-
35248819315
-
Universal composition with joint state
-
Proceedings of CRYPTO 2003, Springer Verlag, New York, pp
-
CANETTI, R. AND RABIN, T. 2003. Universal composition with joint state. In Proceedings of CRYPTO 2003. Lecture Notes in Computer Science, vol. 2729. Springer Verlag, New York, pp. 265-281.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 265-281
-
-
CANETTI, R.1
RABIN, T.2
-
9
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
ACM, New York, pp
-
CHAUM, D., CREPEAU, C., AND DAMGARD, I. 1988. Multiparty unconditionally secure protocols. In Proceedings of the 20th Annual Symposium on Theory of Computing. ACM, New York, pp. 11-19.
-
(1988)
Proceedings of the 20th Annual Symposium on Theory of Computing
, pp. 11-19
-
-
CHAUM, D.1
CREPEAU, C.2
DAMGARD, I.3
-
10
-
-
22344447481
-
Byzantine agreement given partial broadcast
-
CONSIDINE, J., FITZI, M., FRANKLIN, M., LEVIN, L. A., MAURER, U., AND METCALF, D. 2005. Byzantine agreement given partial broadcast. J. Crypt. 18, 3, 191-217.
-
(2005)
J. Crypt
, vol.18
, Issue.3
, pp. 191-217
-
-
CONSIDINE, J.1
FITZI, M.2
FRANKLIN, M.3
LEVIN, L.A.4
MAURER, U.5
METCALF, D.6
-
11
-
-
84974597111
-
Parallel reducibility for information-theoretically secure computation
-
Proceedings of CRYPTO'00, Springer-Verlag, New York, pp
-
DODIS, Y., AND MICALI, S. 2000. Parallel reducibility for information-theoretically secure computation. In Proceedings of CRYPTO'00. Lecture Notes in Computer Science, vol. 1880. Springer-Verlag, New York, pp. 74-92.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 74-92
-
-
DODIS, Y.1
MICALI, S.2
-
12
-
-
0031632567
-
Concurrent zero-knowledge
-
ACM, New York, pp
-
DWORK, C., NAOR, M., AND SAHAI, A. 1998. Concurrent zero-knowledge. In Proceedings of the 30th Annual Symposium on Theory of Computing. ACM, New York, pp. 409-418.
-
(1998)
Proceedings of the 30th Annual Symposium on Theory of Computing
, pp. 409-418
-
-
DWORK, C.1
NAOR, M.2
SAHAI, A.3
-
13
-
-
0001683636
-
Authenticated algorithms for byzantine agreement
-
DOLEV, D., AND STRONG, H. R. 1983. Authenticated algorithms for byzantine agreement. SIAM J. Comput. 12, 4, 656-665.
-
(1983)
SIAM J. Comput
, vol.12
, Issue.4
, pp. 656-665
-
-
DOLEV, D.1
STRONG, H.R.2
-
14
-
-
0022562351
-
Easy impossibility proofs for distributed consensus problems
-
FISCHER, M., LYNCH, N., AND MERRITT, M. 1986. Easy impossibility proofs for distributed consensus problems. Distrib. Comput. 1, 1, 26-39.
-
(1986)
Distrib. Comput
, vol.1
, Issue.1
, pp. 26-39
-
-
FISCHER, M.1
LYNCH, N.2
MERRITT, M.3
-
15
-
-
84947209216
-
Unconditional Byzantine agreement and multi-party computation secure against dishonest minorities from scratch
-
Proceedings of EUROCRYPT 2002, Springer-Verlag, New York, pp
-
FITZI, M., GISIN, N., MAURER, U., AND VON ROTZ, O. 2002a. Unconditional Byzantine agreement and multi-party computation secure against dishonest minorities from scratch. In Proceedings of EUROCRYPT 2002. Lecture Notes in Computer Science, vol. 2332. Springer-Verlag, New York, pp. 482-501.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 482-501
-
-
FITZI, M.1
GISIN, N.2
MAURER, U.3
VON ROTZ, O.4
-
16
-
-
0036954542
-
Byzantine agreement secure against faulty majorities from scratch
-
ACM, New York, pp
-
FITZI, M., GOTTESMAN, D., HIRT, M., HOLENSTEIN, T., AND SMITH, A. 2002b. Byzantine agreement secure against faulty majorities from scratch. In Proceedings of 21st Principles of Vatabase System, ACM, New York, pp. 118-126.
-
(2002)
Proceedings of 21st Principles of Vatabase System
, pp. 118-126
-
-
FITZI, M.1
GOTTESMAN, D.2
HIRT, M.3
HOLENSTEIN, T.4
SMITH, A.5
-
17
-
-
0033702889
-
From partial consistency to global broadcast
-
ACM, New York, pp
-
FITZI, M., AND MAURER, U. 2000. From partial consistency to global broadcast. In Proceedings of the 32nd Annual Symposium on Theory of Computing. ACM, New York, pp. 494-503.
-
(2000)
Proceedings of the 32nd Annual Symposium on Theory of Computing
, pp. 494-503
-
-
FITZI, M.1
MAURER, U.2
-
18
-
-
0034510467
-
Concurrent oblivious transfer
-
IEEE Computer Society Press, Los Alamitos, CA, pp
-
GARAY, J., AND MACKENZIE, P. 2000. Concurrent oblivious transfer. In Proceedings of the 41st Annual Symposium on Foundations of Computer Science. IEEE Computer Society Press, Los Alamitos, CA, pp. 314-324.
-
(2000)
Proceedings of the 41st Annual Symposium on Foundations of Computer Science
, pp. 314-324
-
-
GARAY, J.1
MACKENZIE, P.2
-
20
-
-
0141610193
-
Cryptography and cryptographic protocols
-
GOLDREICH, O. 2003. Cryptography and cryptographic protocols. In Dist. Comput. 16, 2, 177-199.
-
(2003)
Dist. Comput
, vol.16
, Issue.2
, pp. 177-199
-
-
GOLDREICH, O.1
-
22
-
-
0029767165
-
On the composition of zero-knowledge proof systems
-
GOLDREICH, O., AND KRAWCZYK, H. 1996. On the composition of zero-knowledge proof systems. SIAM J. Comput. 25, 1, 169-192.
-
(1996)
SIAM J. Comput
, vol.25
, Issue.1
, pp. 169-192
-
-
GOLDREICH, O.1
KRAWCZYK, H.2
-
23
-
-
0023545076
-
How to play any mental game
-
ACM, New York, pp
-
GOLDREICH, O., MICALI, S., AND WIGDERSON, A. 1987. How to play any mental game. In Proceedings of the 19th Annual Symposium on Theory of Computing. ACM, New York, pp. 218-229.
-
(1987)
Proceedings of the 19th Annual Symposium on Theory of Computing
, pp. 218-229
-
-
GOLDREICH, O.1
MICALI, S.2
WIGDERSON, A.3
-
24
-
-
22344432877
-
Secure computation without agreement
-
GOLDWASSER, S., AND LINDELL, Y. 2005. Secure computation without agreement. J. Crypt. 18, 3, 247-287.
-
(2005)
J. Crypt
, vol.18
, Issue.3
, pp. 247-287
-
-
GOLDWASSER, S.1
LINDELL, Y.2
-
25
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
GOLDWASSER, S., MICALI, S., AND RIVEST, R. L. 1988. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17, 2, 281-308.
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 281-308
-
-
GOLDWASSER, S.1
MICALI, S.2
RIVEST, R.L.3
-
26
-
-
0002257571
-
Byzantine agreement with authentication: Observations and applications in tolerating hybrid and link faults
-
GONG, L., LINCOLN, P., AND RUSHBY, J. 1995. Byzantine agreement with authentication: Observations and applications in tolerating hybrid and link faults. In Dependable Computing for Critical Applications, pp. 139-157.
-
(1995)
Dependable Computing for Critical Applications
, pp. 139-157
-
-
GONG, L.1
LINCOLN, P.2
RUSHBY, J.3
-
27
-
-
84976699318
-
The byzantine generals problem
-
LAMPORT, L., SHOSTACK, R., AND PEASE, M. 1982. The byzantine generals problem. ACM Trans. Prog. Lang. Syst. 4, 3, 382-401.
-
(1982)
ACM Trans. Prog. Lang. Syst
, vol.4
, Issue.3
, pp. 382-401
-
-
LAMPORT, L.1
SHOSTACK, R.2
PEASE, M.3
-
28
-
-
84974655726
-
-
MICALI, S., AND ROGAWAY, P. 1991. Secure computation. Unpublished manuscript, 1992. Preliminary version in Proceedings of CRYPTO'91. Lecture Notes in Computer Science, 576. Springer-Verlag, New York, pp. 392-404.
-
MICALI, S., AND ROGAWAY, P. 1991. Secure computation. Unpublished manuscript, 1992. (Preliminary version in Proceedings of CRYPTO'91. Lecture Notes in Computer Science, vol. 576. Springer-Verlag, New York, pp. 392-404.
-
-
-
-
29
-
-
84976810569
-
Reaching agreement in the presence of faults
-
PEASE, M., SHOSTAK, R., AND LAMPORT, L. 1980. Reaching agreement in the presence of faults. J. ACM 27, 2, 228-234.
-
(1980)
J. ACM
, vol.27
, Issue.2
, pp. 228-234
-
-
PEASE, M.1
SHOSTAK, R.2
LAMPORT, L.3
-
30
-
-
0003445668
-
Information-theoretic pseudosignatures and Byzantine agreement for t ≥ n/3
-
2882, 90830, IBM Research
-
PFITZMANN, B., AND WAIDNER, M. 1996. Information-theoretic pseudosignatures and Byzantine agreement for t ≥ n/3. Tech. Rep. RZ 2882 (#90830). IBM Research.
-
(1996)
Tech. Rep. RZ
-
-
PFITZMANN, B.1
WAIDNER, M.2
-
31
-
-
84957621865
-
On the concurrent composition of zero-knowledge proofs
-
Proceedings of EUROCRYPT'99, Springer-Verlag, New York, pp
-
RICHARDSON, R., AND KILIAN, J. 1999. On the concurrent composition of zero-knowledge proofs. In Proceedings of EUROCRYPT'99. Lecture Notes in Computer Science, vol. 1592. Springer-Verlag, New York, pp. 415-431.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 415-431
-
-
RICHARDSON, R.1
KILIAN, J.2
-
32
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L. M. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2, 120-126.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
RIVEST, R.L.1
SHAMIR, A.2
ADLEMAN, L.M.3
|