-
1
-
-
0024940038
-
-
Bar-Ilan, J., Beaver, D.: Non-cryptographic fault-tolerant computing in constant number of rounds of interaction. In: P0DC89, pp. 201-209 (1989)
-
Bar-Ilan, J., Beaver, D.: Non-cryptographic fault-tolerant computing in constant number of rounds of interaction. In: P0DC89, pp. 201-209 (1989)
-
-
-
-
2
-
-
85032862464
-
Multiparty protocols tolerating half faulty processors
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Beaver, D.: Multiparty protocols tolerating half faulty processors. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 560-572. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 560-572
-
-
Beaver, D.1
-
3
-
-
84933507780
-
Efficient multiparty protocols using circuit randomization
-
Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
-
Beaver, D.: Efficient multiparty protocols using circuit randomization. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 420-432. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 420-432
-
-
Beaver, D.1
-
4
-
-
84979502594
-
Security with low communication overhead (extended abstract)
-
Menezes, A.J, Vanstone, S.A, eds, CRYPTO 1990, Springer, Heidelberg
-
Beaver, D., Feigenbaum, J., Kilian, J., Rogaway, P.: Security with low communication overhead (extended abstract). In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 62-76. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.537
, pp. 62-76
-
-
Beaver, D.1
Feigenbaum, J.2
Kilian, J.3
Rogaway, P.4
-
5
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract)
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In: 20th STOC, pp. 1-10 (1988)
-
(1988)
20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
33745570603
-
-
Beerliova-Trubiniova, Z., Hirt, M.: Efficient multi-party computation with dispute control. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 305-328. Springer, Heidelberg (2006)
-
Beerliova-Trubiniova, Z., Hirt, M.: Efficient multi-party computation with dispute control. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 305-328. Springer, Heidelberg (2006)
-
-
-
-
7
-
-
0025137207
-
The round complexity of secure protocols (extended abstract)
-
Beaver, D., Micali, S., Rogaway, P.: The round complexity of secure protocols (extended abstract). In: 22nd STOC, pp. 503-513 (1990)
-
(1990)
22nd STOC
, pp. 503-513
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
8
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd FOCS, pp. 136-145 (2001)
-
(2001)
42nd FOCS
, pp. 136-145
-
-
Canetti, R.1
-
9
-
-
84898947315
-
Multiparty unconditionally secure protocols (extended abstract)
-
Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols (extended abstract). In: 20th STOC, pp. 11-19 (1988)
-
(1988)
20th STOC
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
10
-
-
84957717648
-
Efficient multiparty computations secure against an adaptive adversary
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Cramer, R., Damgård, I., Dziembowski, S., Hirt, M., Rabin, T.: Efficient multiparty computations secure against an adaptive adversary. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 311-326. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 311-326
-
-
Cramer, R.1
Damgård, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
11
-
-
0033706246
-
On the complexity of verifiable secret sharing and multiparty computation
-
Cramer, R., Damgård, I., Dziembowski, S.: On the complexity of verifiable secret sharing and multiparty computation. In: 32nd STOC, pp. 325-334 (2000)
-
(2000)
32nd STOC
, pp. 325-334
-
-
Cramer, R.1
Damgård, I.2
Dziembowski, S.3
-
12
-
-
84864708144
-
Multiparty computations ensuring privacy of each party's input and correctness of the result
-
Pomerance, C ed, CRYPTO 1987, Springer, Heidelberg
-
Chaum, D., Damgård, I., van de Graaf, J.: Multiparty computations ensuring privacy of each party's input and correctness of the result. In: Pomerance, C (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 87-119. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 87-119
-
-
Chaum, D.1
Damgård, I.2
van de Graaf, J.3
-
13
-
-
84948975649
-
General secure multi-party computation from any linear secret-sharing scheme
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Cramer, R., Damgård, I., Maurer, U.: General secure multi-party computation from any linear secret-sharing scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 316-334. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 316-334
-
-
Cramer, R.1
Damgård, I.2
Maurer, U.3
-
14
-
-
33749557660
-
Scalable secure multiparty computation
-
Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
Damgård, I., Ishai, Y.: Scalable secure multiparty computation. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 501-520. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 501-520
-
-
Damgård, I.1
Ishai, Y.2
-
15
-
-
33748676639
-
Optimally efficient multi-valued byzantine agreement
-
Fitzi, M., Hirt, M.: Optimally efficient multi-valued byzantine agreement. In: PODC 2006 (2006)
-
(2006)
PODC 2006
-
-
Fitzi, M.1
Hirt, M.2
-
16
-
-
0002337124
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: 19th STOC (1987)
-
(1987)
19th STOC
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
17
-
-
0031628398
-
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
-
Gennaro, R., Rabin, M., Rabin, T.: Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In: PODC'98 (1998)
-
(1998)
PODC'98
-
-
Gennaro, R.1
Rabin, M.2
Rabin, T.3
-
18
-
-
85032194875
-
How to solve any protocol problem - an efficiency improvement
-
Pomerance, C, ed, CRYPTO 1987, Springer, Heidelberg
-
Goldreich, O., Vainish, R.: How to solve any protocol problem - an efficiency improvement. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 73-86. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 73-86
-
-
Goldreich, O.1
Vainish, R.2
-
19
-
-
84880854377
-
Robustness for free in unconditional multi-party computation
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Hirt, M., Maurer, U.: Robustness for free in unconditional multi-party computation. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 101-118. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 101-118
-
-
Hirt, M.1
Maurer, U.2
-
20
-
-
35248861868
-
Efficient secure multi-party computation
-
Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
-
Hirt, M., Maurer, U.M., Przydatek, B.: Efficient secure multi-party computation. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 143-161. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 143-161
-
-
Hirt, M.1
Maurer, U.M.2
Przydatek, B.3
-
21
-
-
33646810497
-
Upper bounds on the communication complexity of optimally resilient cryptographic multiparty computation
-
Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
-
Hirt, M., Nielsen, J.B.: Upper bounds on the communication complexity of optimally resilient cryptographic multiparty computation. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 79-99. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 79-99
-
-
Hirt, M.1
Nielsen, J.B.2
-
22
-
-
33749561443
-
Robust multiparty computation with linear com-munication complexity
-
Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
Hirt, M., Nielsen, J.B.: Robust multiparty computation with linear com-munication complexity. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 463-482. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 463-482
-
-
Hirt, M.1
Nielsen, J.B.2
-
23
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: 21th STOC, pp. 73-85.
-
21th STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
24
-
-
0001772530
-
Protocols for secure computations (extended abstract)
-
Yao, A.C.-C.: Protocols for secure computations (extended abstract). In: 23rd FOCS.
-
23rd FOCS
-
-
Yao, A.C.-C.1
|