-
2
-
-
0036949106
-
Constant-Round Coin-Tossing with a Man-in-the-Middle or Realizing the Shared Random String Model
-
IEEE
-
B. Barak. Constant-Round Coin-Tossing with a Man-in-the-Middle or Realizing the Shared Random String Model. 43rd IEEE Symposium on Foundations of Computer Science (FOCS), IEEE, pp. 345-355, 2002.
-
(2002)
43rd IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 345-355
-
-
Barak, B.1
-
4
-
-
0024940038
-
Non-Cryptographic Fault-Tolerant Computing in Constant Number of Rounds of Interaction
-
ACM
-
J. Bar-Ilan and D. Beaver. Non-Cryptographic Fault-Tolerant Computing in Constant Number of Rounds of Interaction. Principles of Distributed Computing, ACM, pp. 201-209, 1989.
-
(1989)
Principles of Distributed Computing
, pp. 201-209
-
-
Bar-Ilan, J.1
Beaver, D.2
-
8
-
-
0003030602
-
Coin Flipping by Phone
-
M. Blum. Coin Flipping by Phone. IEEE COMPCOM, pp. 133-137, 1982.
-
(1982)
IEEE COMPCOM
, pp. 133-137
-
-
Blum, M.1
-
9
-
-
0000731055
-
Security and Composition of Multi-Party Cryptographic Protocols
-
R. Canetti. Security and Composition of Multi-Party Cryptographic Protocols. J. Cryptology 13(1): 143-202, 2000.
-
(2000)
J. Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
10
-
-
0036038991
-
Universally composable two-party and multi-party secure computation
-
R. Canetti, Y. Lindell, R. Ostrovsky, A. Sahai. Universally composable two-party and multi-party secure computation. STOC 2002: 494-503
-
STOC 2002
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
11
-
-
0011213598
-
Randomness versus Fault-Tolerance
-
R. Canetti, E. Kushilevitz, R. Ostrovsky, A. Rosen: Randomness versus Fault-Tolerance. J. Cryptology 13(1): 107-142 (2000)
-
(2000)
J. Cryptology
, vol.13
, Issue.1
, pp. 107-142
-
-
Canetti, R.1
Kushilevitz, E.2
Ostrovsky, R.3
Rosen, A.4
-
12
-
-
0029723583
-
Adaptively-Secure Multiparty Computation
-
ACM
-
R. Canetti, U. Feige, O. Goldreich, and M. Naor. Adaptively-Secure Multiparty Computation. 28th ACM Symposium on Theory of Computing (STOC), ACM, pp. 639-648, 1996.
-
(1996)
28th ACM Symposium on Theory of Computing (STOC)
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
13
-
-
0034830279
-
Concurrent Zero-Knowledge Requires Ω̃ (logn) Rounds
-
R. Canetti, J. Kilian, E. Petrank, and A. Rosen. Concurrent Zero-Knowledge Requires Ω̃ (logn) Rounds. 33rd ACM Symp. on Theory of Comp. (STOC), ACM, pp. 570-579, 2001.
-
(2001)
33rd ACM Symp. on Theory of Comp. (STOC), ACM
, pp. 570-579
-
-
Canetti, R.1
Kilian, J.2
Petrank, E.3
Rosen, A.4
-
14
-
-
84880872502
-
Secure Distributed Linear Algebra in a Constant Number of Rounds
-
Adv. in Cryptology - Crypto '01, Springer-Verlag
-
R. Cramer and I. Damgård. Secure Distributed Linear Algebra in a Constant Number of Rounds. Adv. in Cryptology - Crypto '01, LNCS 2139, Springer-Verlag, pp. 119-136, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 119-136
-
-
Cramer, R.1
Damgård, I.2
-
15
-
-
84957093995
-
On Concurrent Zero-Knowledge with Preprocessing
-
G. Di Crescenzo and R. Ostrovsky. On Concurrent Zero-Knowledge with Preprocessing. In CRYPTO 1999: pp. 485-502.
-
CRYPTO 1999
, pp. 485-502
-
-
Di Crescenzo, G.1
Ostrovsky, R.2
-
16
-
-
84974602942
-
Improved Non-Committing Encryption Schemes
-
Adv. in Cryptology - Crypto 2000, Springer-Verlag
-
I. Damgård and J.B. Nielsen. Improved Non-Committing Encryption Schemes. Adv. in Cryptology - Crypto 2000, LNCS vol. 1880, Springer-Verlag, pp. 432-450, 2000.
-
(2000)
LNCS
, vol.1880
, pp. 432-450
-
-
Damgård, I.1
Nielsen, J.B.2
-
17
-
-
84880875026
-
Robust Non-interactive Zero Knowledge
-
A. De Santis, G. DiCrescenzo, R. Ostrovsky, G. Persiano, A. Sahai: Robust Non-interactive Zero Knowledge. CRYPTO 2001: 566-598
-
CRYPTO 2001
, pp. 566-598
-
-
De Santis, A.1
Dicrescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
Sahai, A.5
-
19
-
-
84976826800
-
Zero Knowledge Proofs of Knowledge in Two Rounds
-
Adv. in Cryptology - Crypto 1989, Springer-Verlag
-
U. Feige and A. Shamir. Zero Knowledge Proofs of Knowledge in Two Rounds. Adv. in Cryptology - Crypto 1989, LNCS vol. 435, Springer-Verlag, pp. 526-544, 1989.
-
(1989)
LNCS
, vol.435
, pp. 526-544
-
-
Feige, U.1
Shamir, A.2
-
22
-
-
0034830283
-
The Round Complexity of Verifiable Secret Sharing and Secure Multicast
-
ACM
-
R. Gennaro, Y. Ishai, E. Kushilevitz, and T. Rabin. The Round Complexity of Verifiable Secret Sharing and Secure Multicast. 33rd ACM Symposium on Theory of Computing (STOC), ACM, pp. 580-589, 2001.
-
(2001)
33rd ACM Symposium on Theory of Computing (STOC)
, pp. 580-589
-
-
Gennaro, R.1
Ishai, Y.2
Kushilevitz, E.3
Rabin, T.4
-
23
-
-
84937440738
-
On 2-Round Secure Multiparty Computation
-
Adv. in Cryptology - Crypto 2002, Springer-Verlag
-
R. Gennaro, Y. Ishai, E. Kushilevitz, and T. Rabin. On 2-Round Secure Multiparty Computation. Adv. in Cryptology - Crypto 2002, LNCS vol. 2442, Springer-Verlag, pp. 178-193, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 178-193
-
-
Gennaro, R.1
Ishai, Y.2
Kushilevitz, E.3
Rabin, T.4
-
27
-
-
0000108216
-
How to Construct Constant-Round Zero-Knowledge Proof Systems for NP
-
O. Goldreich and A. Kalian. How to Construct Constant-Round Zero-Knowledge Proof Systems for NP. J. Cryptology 9(3): 167-190, 1996.
-
(1996)
J. Cryptology
, vol.9
, Issue.3
, pp. 167-190
-
-
Goldreich, O.1
Kalian, A.2
-
28
-
-
0029767165
-
On the Composition of Zero-Knowledge Proof Systems
-
O. Goldreich and H. Krawczyk. On the Composition of Zero-Knowledge Proof Systems. SIAM J. Computing 25(1): 169-192, 1996.
-
(1996)
SIAM J. Computing
, vol.25
, Issue.1
, pp. 169-192
-
-
Goldreich, O.1
Krawczyk, H.2
-
31
-
-
0033725451
-
Reducibility and Completeness in Private Computations
-
J.. Kilian, E. Kushilevitz, S. Micali, R. Ostrovsky: Reducibility and Completeness in Private Computations. SIAM J. Comput. 29(4): 1189-1208 (2000)
-
(2000)
SIAM J. Comput.
, vol.29
, Issue.4
, pp. 1189-1208
-
-
Kilian, J.1
Kushilevitz, E.2
Micali, S.3
Ostrovsky, R.4
-
32
-
-
0034507841
-
Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation
-
IEEE
-
Y. Ishai and E. Kushilevitz. Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation. 41st IEEE Symposium on Foundations of Computer Science (FOCS), IEEE, pp. 294-304, 2000.
-
(2000)
41st IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 294-304
-
-
Ishai, Y.1
Kushilevitz, E.2
-
33
-
-
33749018100
-
Round Efficiency of Multi-Party Computation with a Dishonest Majority
-
Adv. in Cryptology - Eurocrypt 2003, Springer-Verlag
-
J. Katz, R. Ostrovsky, and A. Smith. Round Efficiency of Multi-Party Computation with a Dishonest Majority. Adv. in Cryptology - Eurocrypt 2003, LNCS vol. 2656, Springer-Verlag, pp. 578-595, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 578-595
-
-
Katz, J.1
Ostrovsky, R.2
Smith, A.3
-
34
-
-
0242442471
-
Amortizing Randomness in Private Multiparty Computations
-
E. Kushilevitz, R. Ostrovsky, A. Rosén: Amortizing Randomness in Private Multiparty Computations. SIAM J. Discrete Math. 16(4): 533-544 (2003)
-
(2003)
SIAM J. Discrete Math.
, vol.16
, Issue.4
, pp. 533-544
-
-
Kushilevitz, E.1
Ostrovsky, R.2
Rosén, A.3
-
36
-
-
85030317201
-
Publicly-Verifiable Non-Interactive Zero-Knowledge Proofs
-
Adv. in Cryptology - Crypto 1990, Springer-Verlag
-
D. Lapidot and A. Shamir. Publicly-Verifiable Non-Interactive Zero-Knowledge Proofs. Adv. in Cryptology - Crypto 1990, LNCS vol. 537, Springer-Verlag, pp. 353-365, 1991.
-
(1991)
LNCS
, vol.537
, pp. 353-365
-
-
Lapidot, D.1
Shamir, A.2
-
37
-
-
35048833033
-
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
-
Adv. in Cryptology - Crypto 2001, Springer-Verlag
-
Y. Lindell. Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. Adv. in Cryptology - Crypto 2001, LNCS vol. 2139, Springer-Verlag, pp. 171-189, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 171-189
-
-
Lindell, Y.1
-
38
-
-
35048881915
-
-
Personal communication
-
Y. Lindell. Personal communication, 2001.
-
(2001)
-
-
Lindell, Y.1
-
39
-
-
84974655726
-
Secure Computation
-
Adv. in Cryptology - Crypto 1991, Springer-Verlag
-
S. Micali and P. Rogaway. Secure Computation. Adv. in Cryptology - Crypto 1991, LNCS vol. 576, Springer-Verlag, pp. 392-404, 1991.
-
(1991)
LNCS
, vol.576
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
40
-
-
84958615425
-
Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions
-
M. Naor, R. Ostrovsky, R. Venkatesan, M.Yung. Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions. CRYPTO 1992: 196-214
-
CRYPTO 1992
, pp. 196-214
-
-
Naor, M.1
Ostrovsky, R.2
Venkatesan, R.3
Yung, M.4
-
42
-
-
84957621865
-
On the Concurrent Composition of Zero-Knowledge Proofs
-
Adv. in Cryptology - Eurocrypt 1999, Springer-Verlag
-
R. Richardson and J. Kilian. On the Concurrent Composition of Zero-Knowledge Proofs. Adv. in Cryptology - Eurocrypt 1999, LNCS vol. 1592, Springer-Verlag, pp. 415-431, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 415-431
-
-
Richardson, R.1
Kilian, J.2
|