-
1
-
-
33746365751
-
Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
-
Beaver, D.: Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology, 75-122 (1991)
-
(1991)
Journal of Cryptology
, vol.75-122
-
-
Beaver, D.1
-
2
-
-
0003661492
-
-
Computer Science Research
-
Berman, P., Garay, J.A, Perry, K.J.: Bit optimal distributed consensus. Computer Science Research, 313-322 (1992)
-
(1992)
Bit optimal distributed consensus
, pp. 313-322
-
-
Berman, P.1
Garay, J.A.2
Perry, K.J.3
-
3
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proc. 20th STOC, pp. 1-10 (1988)
-
(1988)
Proc. 20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
4
-
-
33745570603
-
-
Beerliova-Trubiniova, Z., Hirt, M.: Efficient multi-party computation with dispute control. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 305-328. Springer, Heidelberg (2006)
-
Beerliova-Trubiniova, Z., Hirt, M.: Efficient multi-party computation with dispute control. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 305-328. Springer, Heidelberg (2006)
-
-
-
-
5
-
-
85029623402
-
Unconditional Byzantine agreement with good majority
-
Jantzen, M, Choffrut, C, eds, STACS 1991, Springer, Heidelberg
-
Baum-Waidner, B., Pfitzmann, B., Waidner, M.: Unconditional Byzantine agreement with good majority. In: Jantzen, M., Choffrut, C. (eds.) STACS 1991. LNCS, vol. 480, pp. 285-295. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.480
, pp. 285-295
-
-
Baum-Waidner, B.1
Pfitzmann, B.2
Waidner, M.3
-
6
-
-
84957717648
-
Efficient multiparty computations secure against an adaptive adversary
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Cramer, R., Damgård, I., Dziembowski, S., Hirt, M., Rabin, T.: Efficient multiparty computations secure against an adaptive adversary. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 311-326. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 311-326
-
-
Cramer, R.1
Damgård, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
7
-
-
0018456171
-
-
Carter, L., Wegman, M.N.: Universal classes of hash functions. JCSS 18(4), 143-154 (1979) (Preliminary version in Proc. 9st STOC, 1977)
-
Carter, L., Wegman, M.N.: Universal classes of hash functions. JCSS 18(4), 143-154 (1979) (Preliminary version in Proc. 9st STOC, 1977)
-
-
-
-
8
-
-
0026839969
-
Modular construction of a Byzantine agreement protocol with optimal message bit complexity
-
Coan, B.A, Welch, J.L.: Modular construction of a Byzantine agreement protocol with optimal message bit complexity. Information and Computation 97(1), 61-85 (1992)
-
(1992)
Information and Computation
, vol.97
, Issue.1
, pp. 61-85
-
-
Coan, B.A.1
Welch, J.L.2
-
9
-
-
38349032869
-
-
Dolev, D., Strong, H.R.: Authenticated algorithms for Byzantine agreement. SIAM Journal on Computing 12(4), 656-666 (1983) (Preliminary version in Proc. 14th STOC, 1982)
-
Dolev, D., Strong, H.R.: Authenticated algorithms for Byzantine agreement. SIAM Journal on Computing 12(4), 656-666 (1983) (Preliminary version in Proc. 14th STOC, 1982)
-
-
-
-
11
-
-
38349054360
-
-
Personal communication
-
Fitzi, M.: Personal communication (2004)
-
(2004)
-
-
Fitzi, M.1
-
12
-
-
0022562351
-
Easy impossibility proofs for distributed consensus problems
-
Fischer, M.J, Lynch, N.A, Merritt, M.: Easy impossibility proofs for distributed consensus problems. Distributed Computing 1, 26-39 (1986)
-
(1986)
Distributed Computing
, vol.1
, pp. 26-39
-
-
Fischer, M.J.1
Lynch, N.A.2
Merritt, M.3
-
13
-
-
35248861868
-
Efficient secure multi-party computation
-
Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
-
Hirt, M., Maurer, U., Przydatek, B.: Efficient secure multi-party computation. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 143-161. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 143-161
-
-
Hirt, M.1
Maurer, U.2
Przydatek, B.3
-
14
-
-
84976810569
-
Reaching agreement in the presence of faults
-
Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. Journal of the ACM 27(2), 228-234 (1980)
-
(1980)
Journal of the ACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
15
-
-
38349054357
-
-
Pfitzmann, B., Waidner, M.: Information-theoretic pseudosignatures and Byzantine agreement for t >= n/3. Technical report, IBM Research (1996)
-
Pfitzmann, B., Waidner, M.: Information-theoretic pseudosignatures and Byzantine agreement for t >= n/3. Technical report, IBM Research (1996)
-
-
-
-
16
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: Proc. 21st STOC, pp. 73-85 (1989)
-
(1989)
Proc. 21st STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
17
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Communications of the ACM 22, 612-613 (1979)
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
18
-
-
84947210346
-
Security notions for unconditionally secure signature schemes
-
Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
-
Shikata, J., Hanaoka, G., Zheng, Y., Imai, H.: Security notions for unconditionally secure signature schemes. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 434-449. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 434-449
-
-
Shikata, J.1
Hanaoka, G.2
Zheng, Y.3
Imai, H.4
|