-
2
-
-
84933507780
-
Efficient multiparty protocols using circuit randomization
-
D. Beaver. Efficient multiparty protocols using circuit randomization. In Advances in Cryptology — CRYPTO ’91, vol. 576 of LNCS, pp. 420–432, 1991.
-
(1991)
Advances in Cryptology — CRYPTO ’91
, vol.576
, pp. 420-432
-
-
Beaver, D.1
-
3
-
-
33746365751
-
Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
-
D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology, pp. 75–122, 1991.
-
(1991)
Journal of Cryptology
, pp. 75-122
-
-
Beaver, D.1
-
4
-
-
84979502594
-
Security with low communication overhead (Extended abstract)
-
D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Security with low communication overhead (extended abstract). In Advances in Cryptology — CRYPTO ’90, pp. 62–76, 1990.
-
(1990)
Advances in Cryptology — CRYPTO ’90
, pp. 62-76
-
-
Beaver, D.1
Feigenbaum, J.2
Kilian, J.3
Rogaway, P.4
-
5
-
-
0024770143
-
Towards optimal distributed consensus (Extended abstract)
-
Expanded version: Bit optimal distributed consensus. In Computer Science Research, 1992
-
P. Berman, J. A. Garay, and K. J. Perry. Towards optimal distributed consensus (extended abstract). In Proc. 21st IEEE Symposium on the Foundations of Computer Science (FOCS), pp. 410–415, 1989. Expanded version: Bit optimal distributed consensus. In Computer Science Research, 1992.
-
(1989)
Proc. 21St IEEE Symposium on the Foundations of Computer Science (FOCS)
, pp. 410-415
-
-
Berman, P.1
Garay, J.A.2
Perry, K.J.3
-
8
-
-
0000731055
-
Security and composition of multi-party cryptographic protocols
-
R. Canetti. Security and composition of multi-party cryptographic protocols. Journal of Cryptology, 13(1):143–202, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
9
-
-
84898947315
-
C. Cr´epeau, and I. Damg˚ard. Multiparty unconditionally secure protocols (extended abstract)
-
D. Chaum, C. Cr´epeau, and I. Damg˚ard. Multiparty unconditionally secure protocols (extended abstract). In Proc. 20th ACM Symposium on the Theory of Computing (STOC), pp. 11–19, 1988.
-
(1988)
Proc. 20Th ACM Symposium on the Theory of Computing (STOC)
, pp. 11-19
-
-
Chaum, D.1
-
10
-
-
84957717648
-
I. Damg˚ard, S. Dziembowski, M. Hirt, and T. Rabin. Efficient multiparty computations secure against an adaptive adversary
-
R. Cramer, I. Damg˚ard, S. Dziembowski, M. Hirt, and T. Rabin. Efficient multiparty computations secure against an adaptive adversary. In Advances in Cryptology — EUROCRYPT ’99, vol. 1592 of LNCS, p p. 311–326, 1999.
-
(1999)
Advances in Cryptology — EUROCRYPT ’99, Vol. 1592 of LNCS
, pp. 311-326
-
-
Cramer, R.1
-
11
-
-
84948975649
-
I. Damg˚ard, and U. Maurer. General secure multi-party computation from any linear secret sharing scheme
-
R. Cramer, I. Damg˚ard, and U. Maurer. General secure multi-party computation from any linear secret sharing scheme. In Advances in Cryptology — EUROCRYPT ’00, vol. 1807 of LNCS, pp. 316–334, 2000.
-
(2000)
Advances in Cryptology — EUROCRYPT ’00, Vol. 1807 of LNCS
, pp. 316-334
-
-
Cramer, R.1
-
15
-
-
0024942275
-
Modular construction of nearly optimal Byzantine agreement protocols
-
Expanded version: Modular construction of a Byzantine agreement protocol with optimal message bit complexity. In Information and Computation, 97(1):61- 85, 1992
-
B. A. Coan and J. L. Welch. Modular construction of nearly optimal Byzantine agreement protocols. In Proc. 8th ACM Symposium on Principles of Distributed Computing (PODC), pp. 295–305, 1989. Expanded version: Modular construction of a Byzantine agreement protocol with optimal message bit complexity. In Information and Computation, 97(1):61- 85, 1992.
-
(1989)
Proc. 8Th ACM Symposium on Principles of Distributed Computing (PODC)
, pp. 295-305
-
-
Coan, B.A.1
Welch, J.L.2
-
16
-
-
0020097405
-
An efficient algorithm for Byzantine agreement without authentication
-
D. Dolev, M. J. Fischer, R. Fowler, N. A. Lynch, and H. R. Strong. An efficient algorithm for Byzantine agreement without authentication. Information and Control, 52(3):257–274, 1982.
-
(1982)
Information and Control
, vol.52
, Issue.3
, pp. 257-274
-
-
Dolev, D.1
Fischer, M.J.2
Fowler, R.3
Lynch, N.A.4
Strong, H.R.5
-
17
-
-
0021976090
-
Bounds on information exchange for Byzantine agreement
-
D. Dolev and R. Reischuk. Bounds on information exchange for Byzantine agreement. Journal of the ACM, 32(1):191–204, 1985.
-
(1985)
Journal of the ACM
, vol.32
, Issue.1
, pp. 191-204
-
-
Dolev, D.1
Reischuk, R.2
-
18
-
-
0020289693
-
Eventual is earlier than ‘Immediate’
-
1982. Final version: Early Stopping in Byzantine Agreement. In Journal of the ACM, October
-
D. Dolev, R. Reischuk, and H. R. Strong. ‘Eventual’ is earlier than ‘Immediate’. In Proc. 23rd IEEE Symposium on the Foundations of Computer Science (FOCS), pp. 196–203, 1982. Final version: Early Stopping in Byzantine Agreement. In Journal of the ACM, 37(4):720-741, October 1990.
-
(1990)
Proc. 23Rd IEEE Symposium on the Foundations of Computer Science (FOCS)
, vol.37
, Issue.4
, pp. 196-203
-
-
Dolev, D.1
Reischuk, R.2
Strong, H.R.3
-
19
-
-
44449153600
-
Trading correctness for privacy in unconditional multi-party computation
-
M. Fitzi, M. Hirt, and U. Maurer. Trading correctness for privacy in unconditional multi-party computation. In Advances in Cryptology — CRYPTO ’98, vol. 1462 of LNCS, pp. 121–136, 1998.
-
(1998)
Advances in Cryptology — CRYPTO ’98, Vol. 1462 of LNCS
, pp. 121-136
-
-
Fitzi, M.1
Hirt, M.2
Maurer, U.3
-
20
-
-
84894281582
-
Optimal algorithms for Byzantine agreement
-
Expanded version in SIAM Journal on Computing, 873–933, August
-
P. Feldman and S. Micali. Optimal algorithms for Byzantine agreement. In Proc. 20th ACM Symposium on the Theory of Computing (STOC), pp. 148–161, 1988. Expanded version in SIAM Journal on Computing 26(4):873–933, August 1997.
-
(1988)
Proc. 20Th ACM Symposium on the Theory of Computing (STOC)
, vol.26
, Issue.4
, pp. 148-161
-
-
Feldman, P.1
Micali, S.2
-
22
-
-
84976655650
-
Cryptographic computation: Secure faulttolerant protocols and the public-key model
-
Springer-Verlag
-
Z. Galil, S. Haber, and M. Yung. Cryptographic computation: Secure faulttolerant protocols and the public-key model. In Advances in Cryptology — CRYPTO ’87, vol. 293 of LNCS, pp. 135–155. Springer-Verlag, 1987.
-
(1987)
Advances in Cryptology — CRYPTO ’87, Vol. 293 of LNCS
, pp. 135-155
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
25
-
-
0012575111
-
Message-optimal protocols for byzantine agreement
-
309–324, 1991. Final version in Mathematical Systems Theory, October
-
V. Hadzilacos and J. Y. Halpern. Message-optimal protocols for byzantine agreement. In Proc. 10th ACM Symposium on Principles of Distributed Computing (PODC), pp. 309–324, 1991. Final version in Mathematical Systems Theory, 26:41-102, October 1993.
-
(1993)
Proc. 10Th ACM Symposium on Principles of Distributed Computing (PODC)
, vol.26
, pp. 41-102
-
-
Hadzilacos, V.1
Halpern, J.Y.2
-
26
-
-
33745999816
-
Player simulation and general adversary structures in perfect multiparty computation
-
Extended abstract in Proc. 16th of ACM PODC ’97
-
M. Hirt and U. Maurer. Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology, 13(1):31–60, 2000. Extended abstract in Proc. 16th of ACM PODC ’97.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 31-60
-
-
Hirt, M.1
Maurer, U.2
-
27
-
-
84974655726
-
Secure computation: The information theoretic case. Manuscript, 1998. Former version: Secure computation
-
Springer-Verlag
-
S. Micali and P. Rogaway. Secure computation: The information theoretic case. Manuscript, 1998. Former version: Secure computation, In Ad vances in Cryptology — CRYPTO ’91, volume 576 of LNCS, pp. 392–404, Springer-Verlag, 1991.
-
(1991)
Ad Vances in Cryptology — CRYPTO ’91, Volume 576 of LNCS
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
30
-
-
84976810569
-
Reaching agreement in the presence of faults
-
M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. Journal of the ACM, 27(2):228–234, 1980.
-
(1980)
Journal of the ACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
|