-
2
-
-
0024769014
-
Multiparty computation with faulty majority
-
D. Beaver and S. Goldwasser, Multiparty computation with faulty majority, Proc. 30th FOCS, pp. 468-473, 1989.
-
(1989)
Proc. 30th FOCS
, pp. 468-473
-
-
Beaver, D.1
Goldwasser, S.2
-
5
-
-
0025246897
-
A fair protocol for signing contracts
-
Jan.
-
M. Ben-Or, O. Goldreich. S. Micali and R. L. Rivest, A fair protocol for signing contracts, IEEE Trans. on Information Theory, vol. 36, 40-46, Jan. 1990.
-
(1990)
IEEE Trans. on Information Theory
, vol.36
, pp. 40-46
-
-
Ben-Or, M.1
Goldreich, O.2
Micali, S.3
Rivest, R.L.4
-
6
-
-
84976804419
-
How to exchange (secret) keys
-
May
-
M. Blum, How to exchange (secret) keys, ACM Transactions on Computer Systems, 1(2):175-193, May 1983.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.2
, pp. 175-193
-
-
Blum, M.1
-
7
-
-
0022716288
-
A Simple Unpredictable Pseudo-Random Number Generator
-
May
-
L. Blum, M. Blum, and M. Shub, A Simple Unpredictable Pseudo-Random Number Generator, SIAM Journal on Computing, Vol. 15, pp. 364-383, May 1986.
-
(1986)
SIAM Journal on Computing
, vol.15
, pp. 364-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
8
-
-
84974588386
-
Timed commitments
-
Advances in Cryptology - Crypto '2000
-
D. Boneh and M. Naor, Timed commitments, Advances in Cryptology - Crypto '2000, Springer-Verlag LNCS 1880, 236-254, 2000.
-
(2000)
Springer-Verlag LNCS
, vol.1880
, pp. 236-254
-
-
Boneh, D.1
Naor, M.2
-
9
-
-
0035879575
-
A Fair and Efficient Solution to the Socialist Millionaires' Problem
-
July
-
F. Boudot, B. Schoenmakers and J. Traore, A Fair and Efficient Solution to the Socialist Millionaires' Problem, Discrete App. Math. 111, pp. 23-36, July 2001.
-
(2001)
Discrete App. Math.
, vol.111
, pp. 23-36
-
-
Boudot, F.1
Schoenmakers, B.2
Traore, J.3
-
10
-
-
84949198248
-
Gradual and verifiable release of a secret
-
Adv. in Crypt. - Crypto '87
-
E. Brickell, D. Chaum, I. Damgard and J. van de Graaf, Gradual and verifiable release of a secret, Adv. in Crypt. - Crypto '87, Springer-Verlag LNCS 293, 1988.
-
(1988)
Springer-Verlag LNCS
, vol.293
-
-
Brickell, E.1
Chaum, D.2
Damgard, I.3
Van De Graaf, J.4
-
11
-
-
1142307279
-
Optimistic fair secure computation
-
Advances in Cryptology - Crypto '2000
-
C. Cachin and J. Camenish, Optimistic fair secure computation, Advances in Cryptology - Crypto '2000, Springer-Verlag LNCS 1880, 94-112, 2000.
-
(2000)
Springer-Verlag LNCS
, vol.1880
, pp. 94-112
-
-
Cachin, C.1
Camenish, J.2
-
12
-
-
0020915882
-
Blind signatures for untraceable payments
-
D. Chaum, Blind signatures for untraceable payments, Advances in Cryptology - Crypto '82, pp. 199-203, 1982.
-
(1982)
Advances in Cryptology - Crypto '82
, pp. 199-203
-
-
Chaum, D.1
-
14
-
-
0012610677
-
Limits on the security of coin flips when half the processors are faulty
-
R. Cleve, Limits on the security of coin flips when half the processors are faulty, STOC '86, 364-369, 1986.
-
(1986)
STOC '86
, pp. 364-369
-
-
Cleve, R.1
-
15
-
-
85032862578
-
Controlled gradual disclosure schemes for random bits and their applications
-
Adv. in Crypt. - Crypto '89
-
R. Cleve, Controlled gradual disclosure schemes for random bits and their applications, Adv. in Crypt. - Crypto '89, Springer-Verlag, LNCS 435, 573-588, 1990.
-
(1990)
Springer-Verlag, LNCS
, vol.435
, pp. 573-588
-
-
Cleve, R.1
-
16
-
-
85016672373
-
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
-
Advances in Cryptology - Crypto '94
-
R. Cramer, I. Damgard and B. Schoenmakers, Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols, Advances in Cryptology - Crypto '94, Springer Verlag LNCS, vol. 839, pp. 174-187, 1994.
-
(1994)
Springer Verlag LNCS
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgard, I.2
Schoenmakers, B.3
-
17
-
-
0029362450
-
Practical and provably secure release of a secret and exchange of signatures
-
I. Damgard, Practical and provably secure release of a secret and exchange of signatures, J. Cryptology, 8(4):201-222, 1995.
-
(1995)
J. Cryptology
, vol.8
, Issue.4
, pp. 201-222
-
-
Damgard, I.1
-
18
-
-
0001126172
-
Pricing via processing, or combatting junk email
-
Springer-Verlag
-
C. Dwork and M. Naor, Pricing via processing, or combatting junk email, Advances in Cryptology - Crypto '92, Springer-Verlag, 139-147, 1990.
-
(1990)
Advances in Cryptology - Crypto '92
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
20
-
-
84976655650
-
Cryptographic Computation: Secure Fault-tolerant Protocols and the Public-Key Model
-
Advances in Cryptology - Crypto '87
-
Z. Galil, S. Haber and M. Yung, Cryptographic Computation: Secure Fault-tolerant Protocols and the Public-Key Model, Advances in Cryptology - Crypto '87, Springer-Verlag LNCS 293, 135-155, 1988.
-
(1988)
Springer-Verlag LNCS
, vol.293
, pp. 135-155
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
24
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
Adv. in Crypt. - Crypto '90
-
S. Goldwasser and L. Levin, Fair computation of general functions in presence of immoral majority, Adv. in Crypt. - Crypto '90, Springer-Verlag LNCS 537, 1991.
-
(1991)
Springer-Verlag LNCS
, vol.537
-
-
Goldwasser, S.1
Levin, L.2
-
25
-
-
4243127426
-
How to simultaneously exchange secret bit by flipping a symmetrically-biased coin
-
M. Luby, S. Micali and C. Rackoff, How to simultaneously exchange secret bit by flipping a symmetrically-biased coin, Proceedings of FOCS '83, 23-30, 1983.
-
(1983)
Proceedings of FOCS '83
, pp. 23-30
-
-
Luby, M.1
Micali, S.2
Rackoff, C.3
-
26
-
-
84949193057
-
Timed-Release Cryptography
-
Selected Areas in Cryptography VIII (SAC '01)
-
W. Mao, Timed-Release Cryptography, Selected Areas in Cryptography VIII (SAC '01), Springer-Verlag LNCS 2259, pp. 342-357, 2001.
-
(2001)
Springer-Verlag LNCS
, vol.2259
, pp. 342-357
-
-
Mao, W.1
-
27
-
-
43149113579
-
Secure protocols with invisible trusted parties
-
Weizmann Inst. of Science, June
-
S. Micali, Secure protocols with invisible trusted parties, presented at the Workshop for Multi-Party Secure Protocols, Weizmann Inst. of Science, June 1998.
-
(1998)
Workshop for Multi-Party Secure Protocols
-
-
Micali, S.1
|