-
1
-
-
0027188428
-
Asynchronous secure computation
-
Ben-Or, M., Canetti, R., Goldreich, O.: Asynchronous secure computation. In: Proc. 25th STOC, pp. 52-61 (1993)
-
(1993)
Proc. 25th STOC
, pp. 52-61
-
-
Ben-Or, M.1
Canetti, R.2
Goldreich, O.3
-
2
-
-
33746365751
-
Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
-
Beaver, D.: Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology, 75-122 (1991)
-
(1991)
Journal of Cryptology
, vol.75-122
-
-
Beaver, D.1
-
3
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proc. 20th STOC, pp. 1-10 (1988)
-
(1988)
Proc. 20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
4
-
-
33745570603
-
-
Beerliova-Trubiniova, Z., Hirt, M.: Efficient multi-party computation with dispute control. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 305-328. Springer, Heidelberg (2006)
-
Beerliova-Trubiniova, Z., Hirt, M.: Efficient multi-party computation with dispute control. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 305-328. Springer, Heidelberg (2006)
-
-
-
-
5
-
-
85008184918
-
Asynchronous secure computations with optimal resilience (extended abstract)
-
Ben-Or, M., Kelmer, B., Rabin, T.: Asynchronous secure computations with optimal resilience (extended abstract). In: Proc. 13th PODC, pp. 183-192 (1994)
-
(1994)
Proc. 13th PODC
, pp. 183-192
-
-
Ben-Or, M.1
Kelmer, B.2
Rabin, T.3
-
6
-
-
0011797655
-
An asynchronous [(n - 1)/3]-resilient consensus protocol
-
Bracha, G.: An asynchronous [(n - 1)/3]-resilient consensus protocol. In: Proc. 3rd PODC, pp. 154-162 (1984)
-
(1984)
Proc. 3rd PODC
, pp. 154-162
-
-
Bracha, G.1
-
8
-
-
84898947315
-
Multiparty unconditionally secure protocols (extended abstract)
-
Chaum, D., Crépeau, C., Damgård, L: Multiparty unconditionally secure protocols (extended abstract). In: Proc. 20th STOC, pp. 11-19 (1988)
-
(1988)
Proc. 20th STOC
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, L.3
-
9
-
-
84864708144
-
Multiparty computations ensuring privacy of each party's input and correctness of the result
-
Pomerance, C, ed, CRYPTO 1987, Springer, Heidelberg
-
Chaum, D., Damgård, I., van de Graaf, J.: Multiparty computations ensuring privacy of each party's input and correctness of the result. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 87-119. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 87-119
-
-
Chaum, D.1
Damgård, I.2
van de Graaf, J.3
-
10
-
-
38349016323
-
Robust multiparty computation with linear communication complexity
-
CRYPTO, Springer, Heidelberg
-
Damgård, I., Nielsen, J.B.: Robust multiparty computation with linear communication complexity. In: CRYPTO 2007. LNCS, vol. 4622, Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
-
-
Damgård, I.1
Nielsen, J.B.2
-
11
-
-
84976655650
-
Cryptographic computation: Secure fault-tolerant protocols and the public-key model
-
Pomeranèe, C, ed, CRYPTO 1987, Springer, Heidelberg
-
Galil, Z., Haber, S., Yung, M.: Cryptographic computation: Secure fault-tolerant protocols and the public-key model. In: Pomeranèe, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 135-155. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 135-155
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
12
-
-
0023545076
-
How to play any mental game - a completeness theorem for protocols with honest majority
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: Proc. 19th STOC, pp. 218-229 (1987)
-
(1987)
Proc. 19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
13
-
-
35248861868
-
Efficient secure multi-party computation
-
Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
-
Hirt, M., Maurer, U., Przydatek, B.: Efficient secure multi-party computation. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 143-161. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 143-161
-
-
Hirt, M.1
Maurer, U.2
Przydatek, B.3
-
14
-
-
33749561443
-
Robust multiparty computation with linear communication complexity
-
Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
Hirt, M., Nielsen, J.B.: Robust multiparty computation with linear communication complexity. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 463-482. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 463-482
-
-
Hirt, M.1
Nielsen, J.B.2
-
15
-
-
24944494113
-
Cryptographic asynchronous multi-party computation with optimal resilience
-
Cramer, R.J.F, ed, EU-ROCRYPT 2005, Springer, Heidelberg
-
Hirt, M., Nielsen, J.B., Przydatek, B.: Cryptographic asynchronous multi-party computation with optimal resilience. In: Cramer, R.J.F. (ed.) EU-ROCRYPT 2005. LNCS, vol. 3494, pp. 322-340. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 322-340
-
-
Hirt, M.1
Nielsen, J.B.2
Przydatek, B.3
-
16
-
-
84974727234
-
Asynchronous unconditionally secure computation: An efficiency improvement
-
Menezes, A.J, Sarkar, P, eds, INDOCRYPT 2002, Springer, Heidelberg
-
Prabhu, B., Srinathan, K., Rangan, C.P.: Asynchronous unconditionally secure computation: An efficiency improvement. In: Menezes, A.J., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2551
-
-
Prabhu, B.1
Srinathan, K.2
Rangan, C.P.3
-
17
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: Proc. 21st STOC, pp. 73-85 (1989)
-
(1989)
Proc. 21st STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
18
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Communications of the ACM 22, 612-613 (1979)
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
19
-
-
84947784853
-
Efficient asynchronous secure multiparty distributed computation
-
Roy, B, Okamoto, E, eds, INDOCRYPT 2000, Springer, Heidelberg
-
Srinathan, K., Rangan, C.P.: Efficient asynchronous secure multiparty distributed computation. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1977
-
-
Srinathan, K.1
Rangan, C.P.2
-
20
-
-
0020312165
-
Protocols for secure computations
-
Yao, A.C.: Protocols for secure computations. In: Proc. 23rd FOCS, pp. 160-164 (1982)
-
(1982)
Proc. 23rd FOCS
, pp. 160-164
-
-
Yao, A.C.1
|