-
1
-
-
33746365751
-
Secure Multi-party Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority
-
D. Beaver. Secure Multi-party Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority. Journal of Cryptology, 4(2):75-122, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.2
, pp. 75-122
-
-
Beaver, D.1
-
2
-
-
0029702971
-
Adaptive Zero-Knowledge and Computational Equivocation
-
D. Beaver. Adaptive Zero-Knowledge and Computational Equivocation. In 28th STOC, pages 629-638, 1996.
-
(1996)
28th STOC
, pp. 629-638
-
-
Beaver, D.1
-
3
-
-
84957064831
-
The All-or-Nothing Nature of Two-Party Secure Computation
-
CRYPTO'99, Springer-Verlag
-
A. Beimel, T. Malkin and S. Micali. The All-or-Nothing Nature of Two-Party Secure Computation. In CRYPTO'99, Springer-Verlag (LNCS 1666), pages 80-97, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 80-97
-
-
Beimel, A.1
Malkin, T.2
Micali, S.3
-
4
-
-
84898960610
-
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
-
M. Ben-Or, S. Goldwasser and A. Wigderson. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In 20th STOC, pages 1-10, 1988.
-
(1988)
20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
0035163054
-
Universally Composable Security: A New Paradigm for Cryptographic Protocols
-
Full version
-
R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 42nd FOCS, pages 136-145, 2001. Full version available at http://eprint.iacr.org/2000/067.
-
(2001)
42nd FOCS
, pp. 136-145
-
-
Canetti, R.1
-
7
-
-
84880897758
-
Universally Composable Commitments
-
CRYPTO 2001, Springer-Verlag
-
R. Canetti and M. Fischlin. Universally Composable Commitments. In CRYPTO 2001, Springer-Verlag (LNCS 2139), pages 19-40, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
8
-
-
35048860626
-
Analysis of Key Exchange Protocols and Their Use for Building Secure Channels
-
Eurocrypt 2001, Springer-Verlag
-
R. Canetti and H. Krawczyk. Analysis of Key Exchange Protocols and Their Use for Building Secure Channels. In Eurocrypt 2001, Springer-Verlag (LNCS 2045), pages 453-474, 2001.
-
(2001)
LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
9
-
-
84947232363
-
Universally composable key exchange and secure channels
-
Eurocrypt 2002, Springer-Verlag
-
R. Canetti and H. Krawczyk. Universally composable key exchange and secure channels. In Eurocrypt 2002, Springer-Verlag (LNCS 2332), pages 337-351, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 337-351
-
-
Canetti, R.1
Krawczyk, H.2
-
10
-
-
35248850473
-
On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions (full version)
-
R. Canetti, E. Kushilevitz and Y. Lindell. On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions (full version). Cryptology ePrint Archive, http://eprint.iacr.org/, 2003.
-
(2003)
Cryptology ePrint Archive
-
-
Canetti, R.1
Kushilevitz, E.2
Lindell, Y.3
-
11
-
-
0036038991
-
Universally Composable Two-Party and Multi-Party Computation
-
R. Canetti, Y. Lindell, R. Ostrovsky and A. Sahai. Universally Composable Two-Party and Multi-Party Computation. In 34th STOC, pages 494-503, 2002.
-
(2002)
34th STOC
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
12
-
-
0024860209
-
A Zero-One Law for Boolean Privacy
-
B. Chor, and E. Kushilevitz. A Zero-One Law for Boolean Privacy. In 21st STOC, pages 62-72, 1989.
-
(1989)
21st STOC
, pp. 62-72
-
-
Chor, B.1
Kushilevitz, E.2
-
13
-
-
0012610677
-
Limits on the security of coin-flips when half the processors are faulty
-
R. Cleve. Limits on the security of coin-flips when half the processors are faulty. In 18th STOC, pages 364-369, 1986.
-
(1986)
18th STOC
, pp. 364-369
-
-
Cleve, R.1
-
15
-
-
0031632567
-
Concurrent Zero-Knowledge
-
C. Dwork, M. Naor, and A. Sahai. Concurrent Zero-Knowledge. In 30th STOC, pages 409-418, 1998.
-
(1998)
30th STOC
, pp. 409-418
-
-
Dwork, C.1
Naor, M.2
Sahai, A.3
-
16
-
-
0034510467
-
Concurrent Oblivious Transfer
-
J. Garay and P. Mackenzie. Concurrent Oblivious Transfer. In 41st FOCS, pages 314-324, 2000.
-
(2000)
41st FOCS
, pp. 314-324
-
-
Garay, J.1
Mackenzie, P.2
-
17
-
-
0029767165
-
On the composition of zero-knowledge proof systems
-
O. Goldreich and H. Krawczyk. On the composition of zero-knowledge proof systems. SIAM Journal of Computing, 25(1):169-192, 1996.
-
(1996)
SIAM Journal of Computing
, vol.25
, Issue.1
, pp. 169-192
-
-
Goldreich, O.1
Krawczyk, H.2
-
18
-
-
0023545076
-
How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority
-
O. Goldreich, S. Micali and A. Wigderson. How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In 19th STOC, pages 218-229, 1987.
-
(1987)
19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
19
-
-
84955564077
-
Fair Computation of General Functions in Presence of Immoral Majority
-
CRYPTO'90, Springer-Verlag
-
S. Goldwasser and L. Levin. Fair Computation of General Functions in Presence of Immoral Majority. In CRYPTO'90, Springer-Verlag (LNCS 537), pages 77-93, 1990.
-
(1990)
LNCS
, vol.537
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
21
-
-
0033725451
-
Reducibility and Completeness in Private Computations
-
J. Kilian, E. Kushilevitz, S. Micali, and R. Ostrovsky. Reducibility and Completeness in Private Computations. SICOMP, 29(4):1189-1208, 2000.
-
(2000)
SICOMP
, vol.29
, Issue.4
, pp. 1189-1208
-
-
Kilian, J.1
Kushilevitz, E.2
Micali, S.3
Ostrovsky, R.4
-
22
-
-
0033706604
-
More general completeness theorems for secure two-party computation
-
J. Kilian. More general completeness theorems for secure two-party computation. In 32nd STOC, pages 316-324, 2000.
-
(2000)
32nd STOC
, pp. 316-324
-
-
Kilian, J.1
-
23
-
-
0024768184
-
Privacy and Communication Complexity
-
E. Kushilevitz. Privacy and Communication Complexity. In 30th FOCS, pages 416-421, 1989.
-
(1989)
30th FOCS
, pp. 416-421
-
-
Kushilevitz, E.1
-
24
-
-
84974655726
-
Secure computation
-
Unpublished manuscript, 1992. Preliminary version in CRYPTO'91, Springer-Verlag
-
S. Micali and P. Rogaway. Secure computation. Unpublished manuscript, 1992. Preliminary version in CRYPTO'91, Springer-Verlag (LNCS 576), pages 392-404, 1991.
-
(1991)
LNCS
, vol.576
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
25
-
-
0024983231
-
Public key cryptosystems provably secure against chosen ciphertext attacks
-
M. Naor and M. Yung. Public key cryptosystems provably secure against chosen ciphertext attacks. In 22nd STOC, 427-437, 1990.
-
(1990)
22nd STOC
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
26
-
-
0024859552
-
Verifiable Secret Sharing and Multi-party Protocols with Honest Majority
-
T. Rabin and M. Ben-Or. Verifiable Secret Sharing and Multi-party Protocols with Honest Majority. In 21st STOC, pages 73-85, 1989.
-
(1989)
21st STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
27
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
CRYPTO'91, Springer-Verlag
-
C. Rackoff and D. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In CRYPTO'91, Springer-Verlag (LNCS 576), pages 433-444, 1991.
-
(1991)
LNCS
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.2
-
28
-
-
84957621865
-
On the Concurrent Composition of Zero-Knowledge Proofs
-
Eurocrypt'99, Springer-Verlag
-
R. Richardson and J. Kilian. On the Concurrent Composition of Zero-Knowledge Proofs. In Eurocrypt'99, Springer-Verlag (LNCS 1592), pages 415-431, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 415-431
-
-
Richardson, R.1
Kilian, J.2
|