-
1
-
-
0005260647
-
Multiparty Protocols Tolerating Half Faulty Processors
-
D. Beaver. Multiparty Protocols Tolerating Half Faulty Processors. Crypto '89.
-
Crypto '89
-
-
Beaver, D.1
-
2
-
-
35448983095
-
-
D. Beaver and S. Goldwasser. Multiparty Computation with Faulty Majority. FOCS '89.
-
D. Beaver and S. Goldwasser. Multiparty Computation with Faulty Majority. FOCS '89.
-
-
-
-
3
-
-
35448955649
-
-
D. Beaver, S. Micali, and P. Rogaway. The Round Complexity of Secure Protocols. STOC '90.
-
D. Beaver, S. Micali, and P. Rogaway. The Round Complexity of Secure Protocols. STOC '90.
-
-
-
-
4
-
-
35448993254
-
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. STOC '88.
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. STOC '88.
-
-
-
-
5
-
-
35448992440
-
-
D. Boneh and M. Naor. Timed Commitments. Crypto 2000.
-
D. Boneh and M. Naor. Timed Commitments. Crypto 2000.
-
-
-
-
6
-
-
0000731055
-
Security and Composition of Multiparty Cryptographic Protocols
-
R. Canetti. Security and Composition of Multiparty Cryptographic Protocols. J. Cryptology 13(1): 143-202, 2000.
-
(2000)
J. Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
7
-
-
84858358886
-
-
D. Chaum, C. Crépeau, and I. Damgàrd. Multiparty Unconditionally-Secure Protocols. STOC '88.
-
D. Chaum, C. Crépeau, and I. Damgàrd. Multiparty Unconditionally-Secure Protocols. STOC '88.
-
-
-
-
8
-
-
35448989719
-
-
R. Cleve. Limits on the Security of Coin Flips when Half the Processors are Faulty. STOC '86.
-
R. Cleve. Limits on the Security of Coin Flips when Half the Processors are Faulty. STOC '86.
-
-
-
-
9
-
-
35448987255
-
Controlled Gradual Disclosure Schemes for Random Bits and Their Applications
-
R. Cleve. Controlled Gradual Disclosure Schemes for Random Bits and Their Applications. Crypto '89.
-
Crypto '89
-
-
Cleve, R.1
-
10
-
-
0022080529
-
A Randomized Protocol for Signing Contracts
-
S. Even, O. Goldreich, and A. Lempel. A Randomized Protocol for Signing Contracts. Comm. ACM 28(6): 637-647, 1985.
-
(1985)
Comm. ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
11
-
-
35448969275
-
Trading Correctness for Privacy in Unconditional Multiparty Computation
-
M. Fitzi, M. Hirt, and U. Maurer. Trading Correctness for Privacy in Unconditional Multiparty Computation. Crypto '98.
-
Crypto '98
-
-
Fitzi, M.1
Hirt, M.2
Maurer, U.3
-
15
-
-
33645593031
-
Foundations of Cryptography
-
Cambridge University Press
-
O. Goldreich. Foundations of Cryptography, vol. 2: Basic Applications. Cambridge University Press, 2004.
-
(2004)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
16
-
-
35448933585
-
-
O. Goldreich, S. Micali, and A. Wigderson. How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. STOC '87.
-
O. Goldreich, S. Micali, and A. Wigderson. How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. STOC '87.
-
-
-
-
17
-
-
0012527958
-
Fair Computation of General Functions in Presence of Immoral Majority
-
S. Goldwasser and L. Levin. Fair Computation of General Functions in Presence of Immoral Majority. Crypto '90.
-
Crypto '90
-
-
Goldwasser, S.1
Levin, L.2
-
18
-
-
22344432877
-
Secure Multiparty Computation without Agreement
-
S. Goldwasser and Y. Lindell. Secure Multiparty Computation without Agreement. J. Cryptology 18(3): 247-287, 2005.
-
(2005)
J. Cryptology
, vol.18
, Issue.3
, pp. 247-287
-
-
Goldwasser, S.1
Lindell, Y.2
-
19
-
-
33749547215
-
-
Y. Ishai, E. Kushilevitz, Y. Lindell, and E. Petrank. On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation. Crypto 2006.
-
Y. Ishai, E. Kushilevitz, Y. Lindell, and E. Petrank. On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation. Crypto 2006.
-
-
-
-
21
-
-
33745130227
-
Round Efficiency of Multi-Party Computation with a Dishonest Majority
-
J. Katz, R. Ostrovsky, and A. Smith. Round Efficiency of Multi-Party Computation with a Dishonest Majority. Eurocrypt 2003.
-
(2003)
Eurocrypt
-
-
Katz, J.1
Ostrovsky, R.2
Smith, A.3
-
22
-
-
35448956053
-
-
M. Luby, S. Micali, and C. Rackoff. How to Simultaneously Exchange a Secret Bit by Flipping a Symmetrically-Biased Coin. FOCS '83.
-
M. Luby, S. Micali, and C. Rackoff. How to Simultaneously Exchange a Secret Bit by Flipping a Symmetrically-Biased Coin. FOCS '83.
-
-
-
-
24
-
-
38049154921
-
Fair Secure Two-Party Computation
-
B. Pinkas. Fair Secure Two-Party Computation. Eurocrypt 2003.
-
(2003)
Eurocrypt
-
-
Pinkas, B.1
-
25
-
-
35448976824
-
-
T. Rabin and M. Ben-Or. Verifiable Secret Sharing and Multiparty Protocols with Honest Majority. STOC '89.
-
T. Rabin and M. Ben-Or. Verifiable Secret Sharing and Multiparty Protocols with Honest Majority. STOC '89.
-
-
-
-
26
-
-
0018545449
-
How to Share a Secret
-
A. Shamir. How to Share a Secret. Comm. ACM 22(6):612-613, 1979.
-
(1979)
Comm. ACM
, vol.22
, Issue.6
, pp. 612-613
-
-
Shamir, A.1
-
27
-
-
35448940438
-
-
A. Yao. How to Generate and Exchange Secrets. FOCS '86.
-
A. Yao. How to Generate and Exchange Secrets. FOCS '86.
-
-
-
|