-
1
-
-
17744366431
-
-
0 In: 45th FOCS, pp. 166-175 (2004)
-
0 In: 45th FOCS, pp. 166-175 (2004)
-
-
-
-
2
-
-
33745116951
-
Secure computation of constant-depth circuits with applications to database search problems
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Barkol, O., Ishai, Y.: Secure computation of constant-depth circuits with applications to database search problems. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 395-411. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 395-411
-
-
Barkol, O.1
Ishai, Y.2
-
3
-
-
84928743703
-
Precomputing oblivious transfer
-
Coppersmith, D, ed, CRYPTO 1995, Springer, Heidelberg
-
Beaver, D.: Precomputing oblivious transfer. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 97-109. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.963
, pp. 97-109
-
-
Beaver, D.1
-
4
-
-
0029702967
-
Correlated pseudorandomness and the complexity of private computations
-
Beaver, D.: Correlated pseudorandomness and the complexity of private computations. In: 28th STOC, pp. 479-488 (1996)
-
(1996)
28th STOC
, pp. 479-488
-
-
Beaver, D.1
-
5
-
-
35048856983
-
-
Beimel, A., Malkin, T.: A quantitative approach to reductions in secure computation. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 238-257. Springer, Heidelberg (2004)
-
Beimel, A., Malkin, T.: A quantitative approach to reductions in secure computation. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 238-257. Springer, Heidelberg (2004)
-
-
-
-
6
-
-
84957064831
-
The all-or-nothing nature of two-party secure computation
-
Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
-
Beimel, A., Malkin, T., Micali, S.: The all-or-nothing nature of two-party secure computation. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 80-97. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 80-97
-
-
Beimel, A.1
Malkin, T.2
Micali, S.3
-
7
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
BenOr, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: 20th STOC, pp. 1-10 (1988)
-
(1988)
20th STOC
, pp. 1-10
-
-
BenOr, M.1
Goldwasser, S.2
Wigderson, A.3
-
8
-
-
0003661492
-
Bit optimal distributed consensus
-
Plenum Publishing Corporation
-
Berman, P., Garay, J., Perry, K.: Bit optimal distributed consensus. In: Computer Science Research, pp. 313-332. Plenum Publishing Corporation (1992)
-
(1992)
Computer Science Research
, pp. 313-332
-
-
Berman, P.1
Garay, J.2
Perry, K.3
-
9
-
-
0023436302
-
An o(log n) expected rounds randomized byzantine generals protocol
-
Bracha, G.: An o(log n) expected rounds randomized byzantine generals protocol. Journal of the ACM 34(4), 910-920 (1987)
-
(1987)
Journal of the ACM
, vol.34
, Issue.4
, pp. 910-920
-
-
Bracha, G.1
-
10
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 143-202 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
11
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols. In: 20th STOC, pp. 11-19 (1988)
-
(1988)
20th STOC
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
12
-
-
0026839969
-
Modular construction of a byzantine agreement protocol with optimal message bit complexity
-
Coan, B., Welch, J.: Modular construction of a byzantine agreement protocol with optimal message bit complexity. Information and Computation, 97(1) (1992)
-
(1992)
Information and Computation
, vol.97
, Issue.1
-
-
Coan, B.1
Welch, J.2
-
13
-
-
0024132071
-
Achieving oblivious transfer using weakened security assumptions
-
Crépeau, C., Kilian, J.: Achieving oblivious transfer using weakened security assumptions. In: 29th FOCS, pp. 42-52 (1988)
-
(1988)
29th FOCS
, pp. 42-52
-
-
Crépeau, C.1
Kilian, J.2
-
14
-
-
84957697395
-
On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Damgård, I., Kilian, J., Salvail, L.: On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 56-73. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 56-73
-
-
Damgård, I.1
Kilian, J.2
Salvail, L.3
-
15
-
-
84957611040
-
Lower bounds for oblivious transfer reductions
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Dodis, Y., Micali, S.: Lower bounds for oblivious transfer reductions. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 42-55. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 42-55
-
-
Dodis, Y.1
Micali, S.2
-
17
-
-
0022080529
-
A randomized protocol for signing contracts
-
Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Communications of the ACM 28(6), 637-647 (1985)
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
18
-
-
38049004833
-
-
Fitzi, M., Franklin, M., Garay, J., Vardhan, H.: Towards optimal and efficient perfectly secure message transmission. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, Springer, Heidelberg (2007)
-
Fitzi, M., Franklin, M., Garay, J., Vardhan, H.: Towards optimal and efficient perfectly secure message transmission. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, Springer, Heidelberg (2007)
-
-
-
-
19
-
-
0002992068
-
Joint encryption and message-efficient secure computation
-
Franklin, M., Haber, S.: Joint encryption and message-efficient secure computation. J. Cryptology 9(4), 217-232 (1996)
-
(1996)
J. Cryptology
, vol.9
, Issue.4
, pp. 217-232
-
-
Franklin, M.1
Haber, S.2
-
20
-
-
0000871697
-
Explicit constructions of linear-sized superconcentrators
-
Gabber, O., Galil, Z.: Explicit constructions of linear-sized superconcentrators. JCSS 22(3), 407-420 (1981)
-
(1981)
JCSS
, vol.22
, Issue.3
, pp. 407-420
-
-
Gabber, O.1
Galil, Z.2
-
22
-
-
0023545076
-
How to play any mental game - a completeness theorem for protocols with honest majority
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: 19th STOC, pp. 218-229 (1987)
-
(1987)
19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
23
-
-
71149116146
-
Proofs that yield nothing but their validity, or all languages in NP have zero-knowledge proof system
-
Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity, or all languages in NP have zero-knowledge proof system. Journal of the ACM 38(1), 691-729 (1991)
-
(1991)
Journal of the ACM
, vol.38
, Issue.1
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
24
-
-
85032194875
-
How to solve any protocol problem - an efficiency improvement
-
Pomerance, C, ed, CRYPTO 1987, Springer, Heidelberg
-
Goldreich, O., Vainish, R.: How to solve any protocol problem - an efficiency improvement. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 73-86. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 73-86
-
-
Goldreich, O.1
Vainish, R.2
-
25
-
-
0031504510
-
-
Goldreich, O., Wigderson, A.: Tiny families of functions with random properties: A quality-size trade-off for hashin. Rand. Structs. and Algs. 11(4), 315-343 (1997)
-
Goldreich, O., Wigderson, A.: Tiny families of functions with random properties: A quality-size trade-off for hashin. Rand. Structs. and Algs. 11(4), 315-343 (1997)
-
-
-
-
26
-
-
26944464561
-
-
APPROX-RANDOM, pp
-
Gradwohl, R., Kindler, G., Reingold, O., Ta-Shma, A.: On the error parameter of dispersers. In: APPROX-RANDOM, pp. 294-305 (2005)
-
(2005)
On the error parameter of dispersers
, pp. 294-305
-
-
Gradwohl, R.1
Kindler, G.2
Reingold, O.3
Ta-Shma, A.4
-
27
-
-
24944472289
-
On tolerant combiners for oblivious transfer and other primitives
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Harnik, D., Kilian, J., Naor, M., Reingold, O., Rosen, A.: On tolerant combiners for oblivious transfer and other primitives. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 96-113. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 96-113
-
-
Harnik, D.1
Kilian, J.2
Naor, M.3
Reingold, O.4
Rosen, A.5
-
28
-
-
4544297111
-
Completeness in two-party secure computation - a computational view
-
Harnik, D., Naor, M., Reingold, O., Rosen, A.: Completeness in two-party secure computation - a computational view. In: 36th STOC, pp. 252-261 (2004)
-
(2004)
36th STOC
, pp. 252-261
-
-
Harnik, D.1
Naor, M.2
Reingold, O.3
Rosen, A.4
-
29
-
-
33745999816
-
Player simulation and general adversary structures in perfect multiparty computation
-
Hirt, M., Maurer, U.: Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology 13(1), 31-60 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 31-60
-
-
Hirt, M.1
Maurer, U.2
-
30
-
-
0024866742
-
Limits on the provable consequences of one-way permutations
-
Impagliazzo, R., Rudich, S.: Limits on the provable consequences of one-way permutations. In: 21st STOC, pp. 44-61 (1989)
-
(1989)
21st STOC
, pp. 44-61
-
-
Impagliazzo, R.1
Rudich, S.2
-
31
-
-
24144457853
-
Extending oblivious transfers efficiently
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
32
-
-
0344981502
-
Deterministic extractors for bit-fixing sources and exposure-resilient cryptography
-
Kamp, J., Zuckerman, D.: Deterministic extractors for bit-fixing sources and exposure-resilient cryptography. In: 44th FOCS, pp. 92-101 (2003)
-
(2003)
44th FOCS
, pp. 92-101
-
-
Kamp, J.1
Zuckerman, D.2
-
33
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
Kilian, J.: Founding cryptography on oblivious transfer. In: 20th STOC, pp. 20-31 (1988)
-
(1988)
20th STOC
, pp. 20-31
-
-
Kilian, J.1
-
34
-
-
4544353942
-
A general completeness theorem for two-party games
-
Kilian, J.: A general completeness theorem for two-party games. In: 23rd STOC, pp. 553-560 (1991)
-
(1991)
23rd STOC
, pp. 553-560
-
-
Kilian, J.1
-
35
-
-
38049008242
-
Towards secure and scalable computation in peer-to-peer networks
-
King, V., Saia, J., Sanwalani, V., Vee, E.: Towards secure and scalable computation in peer-to-peer networks. In: 47th FOCS, pp. 87-98 (2006)
-
(2006)
47th FOCS
, pp. 87-98
-
-
King, V.1
Saia, J.2
Sanwalani, V.3
Vee, E.4
-
36
-
-
0000789645
-
Explicit constructions of concentrators
-
Margulis, G.: Explicit constructions of concentrators. Problemy peredaci informacii 9(4), 71-80 (1973)
-
(1973)
Problemy peredaci informacii
, vol.9
, Issue.4
, pp. 71-80
-
-
Margulis, G.1
-
37
-
-
38049022468
-
-
Meier, R., Przydatek, B., Wullschleger, J.: Robuster combiners for oblivious transfer. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, Springer, Heidelberg (2007)
-
Meier, R., Przydatek, B., Wullschleger, J.: Robuster combiners for oblivious transfer. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, Springer, Heidelberg (2007)
-
-
-
-
39
-
-
0028062297
-
Simple and efficient leader election in the full information model
-
Ostrovsky, R., Rajagopalan, S., Vazirani, U.: Simple and efficient leader election in the full information model. In: 26th STOC, pp. 234-242 (1994)
-
(1994)
26th STOC
, pp. 234-242
-
-
Ostrovsky, R.1
Rajagopalan, S.2
Vazirani, U.3
-
40
-
-
38049142508
-
-
Rabin, M.O.: How to exchange secrets by oblivious transfer. TR-81, Harvard (1981)
-
Rabin, M.O.: How to exchange secrets by oblivious transfer. TR-81, Harvard (1981)
-
-
-
-
41
-
-
0002956996
-
Bounds for dispersers, extractors, and depth-two superconcentrators
-
Radhakrishnan, J., Ta-Shma, A.: Bounds for dispersers, extractors, and depth-two superconcentrators. SIAM J. Discrete Math. 13(1), 2-24 (2000)
-
(2000)
SIAM J. Discrete Math
, vol.13
, Issue.1
, pp. 2-24
-
-
Radhakrishnan, J.1
Ta-Shma, A.2
-
42
-
-
38049142982
-
Entropy waves, the zig-zag graph product, and new constant-degree expanders and extractors. ECCC
-
Reingold, O., Vadhan, S., Wigderson, A.: Entropy waves, the zig-zag graph product, and new constant-degree expanders and extractors. ECCC, 8(18) (2001)
-
(2001)
, vol.8
, Issue.18
-
-
Reingold, O.1
Vadhan, S.2
Wigderson, A.3
-
43
-
-
0012579059
-
Recent developments in explicit constructions of extractors
-
Shaltiel, R.: Recent developments in explicit constructions of extractors. Bulletin of the EATCS 77, 67-95 (2002)
-
(2002)
Bulletin of the EATCS
, vol.77
, pp. 67-95
-
-
Shaltiel, R.1
-
44
-
-
0001998264
-
Conjugate coding
-
1
-
Wiesner, S.: Conjugate coding. SIGACT News 15(1), 78-88 (1983)
-
(1983)
SIGACT News
-
-
Wiesner, S.1
-
45
-
-
38049160265
-
-
Wullschleger, J.: Oblivious transfer amplification. In: Naor, M. (ed.) EUROCRYPT 2007, 4515, pp. 555-572. Springer, Heidelberg (2007)
-
Wullschleger, J.: Oblivious transfer amplification. In: Naor, M. (ed.) EUROCRYPT 2007, vol. 4515, pp. 555-572. Springer, Heidelberg (2007)
-
-
-
-
46
-
-
0020312165
-
Protocols for secure computations
-
Yao, A.C.: Protocols for secure computations. In: 23rd FOCS, pp. 160-164 (1982)
-
(1982)
23rd FOCS
, pp. 160-164
-
-
Yao, A.C.1
-
47
-
-
0022882770
-
How to generate and exchange secrets
-
Yao, A.C.: How to generate and exchange secrets. In: 27th FOCS, pp. 162-167 (1986)
-
(1986)
27th FOCS
, pp. 162-167
-
-
Yao, A.C.1
-
48
-
-
0029703647
-
Randomness-optimal sampling, extractors, and constructive leader election
-
Zuckerman, D.: Randomness-optimal sampling, extractors, and constructive leader election. In: 28th STOC, pp. 286-295 (1996)
-
(1996)
28th STOC
, pp. 286-295
-
-
Zuckerman, D.1
|