-
1
-
-
0003619771
-
Perfect privacy for two-party protocols
-
Computer Science, Harvard University
-
D. Beaver. Perfect privacy for two-party protocols. Technical Report TR-11-89, Computer Science, Harvard University, 1989.
-
(1989)
Technical Report
, vol.TR-11-89
-
-
Beaver, D.1
-
2
-
-
0029702967
-
Correlated pseudorandomness and the complexity of private computations
-
D. Beaver. Correlated pseudorandomness and the complexity of private computations. In the 28th Symp. on the Theory of Computing, pages 479-488, 1996.
-
(1996)
28th Symp. on the Theory of Computing
, pp. 479-488
-
-
Beaver, D.1
-
3
-
-
84957064831
-
The all-or-nothing nature of two-party secure computation
-
CRYPTO '99, Springer
-
A. Beimel, T. Malkin, and S. Micali. The all-or-nothing nature of two-party secure computation. In CRYPTO '99, volume 1666 of LNCS, pages 80-97. Springer, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 80-97
-
-
Beimel, A.1
Malkin, T.2
Micali, S.3
-
4
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computations
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic fault-tolerant distributed computations. In the 20th Symp. on the Theory of Computing, pages 1-10, 1988.
-
(1988)
20th Symp. on the Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
84957360961
-
Oblivious transfers and privacy amplification
-
EUROCRYPT '97, Springer
-
G. Brassard and C. Crepeau. Oblivious transfers and privacy amplification. In EUROCRYPT '97, volume 1233 of LNCS, pages 334-347. Springer, 1997.
-
(1997)
LNCS
, vol.1233
, pp. 334-347
-
-
Brassard, G.1
Crepeau, C.2
-
7
-
-
0030283655
-
Oblivious transfers and intersecting codes
-
G. Brassard, C. Crépeau, and M. Sántha. Oblivious transfers and intersecting codes. IEEE Trans, on Information Theory, 42(6):1769-1780, 1996.
-
(1996)
IEEE Trans, on Information Theory
, vol.42
, Issue.6
, pp. 1769-1780
-
-
Brassard, G.1
Crépeau, C.2
Sántha, M.3
-
8
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and composition of multiparty cryptographic protocols. J. of Cryptology, 13(1):143-202, 2000.
-
(2000)
J. of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
11
-
-
85030121757
-
Equivalence between two flavors of oblivious transfers
-
CRYPTO '87, Springer
-
C. Crépeau. Equivalence between two flavors of oblivious transfers. In CRYPTO '87, volume 293 of LNCS, pages 350-354. Springer, 1988.
-
(1988)
LNCS
, vol.293
, pp. 350-354
-
-
Crépeau, C.1
-
13
-
-
84957697395
-
On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
-
EUROCRYPT '99, . Springer
-
I. Damgard, J. Kilian, and L. Salvail. On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions. In EUROCRYPT '99, volume.1592 of LNCS, pages 56-73. Springer, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 56-73
-
-
Damgard, I.1
Kilian, J.2
Salvail, L.3
-
14
-
-
84957611040
-
Lower bounds for oblivious transfer reductions
-
EUROCRYPT '99
-
Y. Dodis and S. Micali. Lower bounds for oblivious transfer reductions. In EUROCRYPT '99, volume 1592 of LNCS, pages 42-55, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 42-55
-
-
Dodis, Y.1
Micali, S.2
-
15
-
-
0034858470
-
A linear lower bound on the unbounded error probabilistic communication complexity
-
J. Forster. A linear lower bound on the unbounded error probabilistic communication complexity. In 16th Conf. on Comput. Complexity, pp. 100-106, 2001.
-
(2001)
16th Conf. on Comput. Complexity
, pp. 100-106
-
-
Forster, J.1
-
16
-
-
85032194875
-
How to solve any protocol problem-an efficiency improvement
-
CRYPTO '87, Springer
-
O. Goldreich and R. Vainish. How to solve any protocol problem-an efficiency improvement. In CRYPTO '87, vol. 293 of LNCS, pages 73-86. Springer, 1988.
-
(1988)
LNCS
, vol.293
, pp. 73-86
-
-
Goldreich, O.1
Vainish, R.2
-
17
-
-
24144457853
-
Extending oblivious transfers efficiently
-
CRYPTO 2003, Springer
-
Y. Ishai, J. Kilian, K. Nissim, and E. Petrank. Extending oblivious transfers efficiently. In CRYPTO 2003, volume 2729 of LNCS, pages 145-161, Springer, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
21
-
-
0033725451
-
Reducibility and completeness in private computations
-
J. Kilian, E. Kushilevitz, S. Micali, and R. Ostrovsky. Reducibility and completeness in private computations. SIAM J. on Computing, 28(4):1189-1208, 2000.
-
(2000)
SIAM J. on Computing
, vol.28
, Issue.4
, pp. 1189-1208
-
-
Kilian, J.1
Kushilevitz, E.2
Micali, S.3
Ostrovsky, R.4
-
22
-
-
0002365530
-
Privacy and communication complexity
-
E. Kushilevitz. Privacy and communication complexity. SIAM J. on Discrete Mathematics, 5(2):273-284, 1992.
-
(1992)
SIAM J. on Discrete Mathematics
, vol.5
, Issue.2
, pp. 273-284
-
-
Kushilevitz, E.1
-
24
-
-
84957050617
-
Information-theoretic cryptography
-
CRYPTO '99, Springer
-
U. Maurer. Information-theoretic cryptography. In CRYPTO '99, volume 1666 of LNCS, pages 47-64. Springer, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 47-64
-
-
Maurer, U.1
|