-
1
-
-
0030646696
-
Optimistic Protocols for Fair Exchange
-
Asokan, N., Schunter, M., Waidner, M.: Optimistic Protocols for Fair Exchange. In: 4th CCS, pp. 8-17 (1997)
-
(1997)
4th CCS
, pp. 8-17
-
-
Asokan, N.1
Schunter, M.2
Waidner, M.3
-
2
-
-
0024769014
-
Multiparty Computation with Faulty Majority
-
Beaver, D., Goldwasser, S.: Multiparty Computation with Faulty Majority. In: 30th FOCS, pp. 468-473 (1989)
-
(1989)
30th FOCS
, pp. 468-473
-
-
Beaver, D.1
Goldwasser, S.2
-
3
-
-
84898960610
-
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In: 20th STOC, pp. 1-10 (1988)
-
(1988)
20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
4
-
-
84969520105
-
Optimistic Fair Secure Computation
-
Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
-
Cachin, C., Camenisch, J.: Optimistic Fair Secure Computation. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 93-111. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 93-111
-
-
Cachin, C.1
Camenisch, J.2
-
5
-
-
0000731055
-
Security and Composition of Multiparty Cryptographic Protocols
-
Canetti, R.: Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology 13(1), 143-202 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
7
-
-
35248819315
-
Universal Composition with Joint State
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Canetti, R., Rabin, T.: Universal Composition with Joint State. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 265-281. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 265-281
-
-
Canetti, R.1
Rabin, T.2
-
8
-
-
84898947315
-
Multi-party Unconditionally Secure Protocols
-
Chaum, D., Crépeau, C., Damgard, I.: Multi-party Unconditionally Secure Protocols. In: 20th STOC, pp. 11-19 (1988)
-
(1988)
20th STOC
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgard, I.3
-
9
-
-
35048878391
-
Concurrent Signatures
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Chen, L., Kudla, C., Paterson, K.: Concurrent Signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 287-305. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 287-305
-
-
Chen, L.1
Kudla, C.2
Paterson, K.3
-
10
-
-
0012610677
-
Limits on the Security of Coin Flips when Half the Processors are Faulty
-
Cleve, R.: Limits on the Security of Coin Flips when Half the Processors are Faulty. In: 18th STOC, pp. 364-369 (1986)
-
(1986)
18th STOC
, pp. 364-369
-
-
Cleve, R.1
-
11
-
-
33745536762
-
-
Garay, J., MacKenzie, P., Prabhakaran, M., Yang, K.: Resource Fairness and Composability of Cryptographic Protocols. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 404-428. Springer, Heidelberg (2006)
-
Garay, J., MacKenzie, P., Prabhakaran, M., Yang, K.: Resource Fairness and Composability of Cryptographic Protocols. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 404-428. Springer, Heidelberg (2006)
-
-
-
-
12
-
-
40249099761
-
-
manuscript
-
Gordon, S.D., Hazay, C., Katz, J., Lindell, Y.: Complete Fairness in Secure Two-Party Computation (manuscript, 2007)
-
(2007)
Complete Fairness in Secure Two-Party Computation
-
-
Gordon, S.D.1
Hazay, C.2
Katz, J.3
Lindell, Y.4
-
13
-
-
33645593031
-
Foundations of Cryptography
-
Cambridge University Press, Cambridge
-
Goldreich, O.: Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press, Cambridge (2004)
-
(2004)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
14
-
-
0023545076
-
How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority
-
Goldreich, O., Micali, S., Wigderson, A.: How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In: 19th STOC, pp. 218-229 (1987)
-
(1987)
19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
15
-
-
84955564077
-
Fair Computation of General Functions in Presence of Immoral Majority
-
Menezes, A, Vanstone, S.A, eds, CRYPTO 1990, Springer, Heidelberg
-
Goldwasser, S., Levin, L.: Fair Computation of General Functions in Presence of Immoral Majority. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 77-93. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.537
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
16
-
-
22344432877
-
Secure Computation Without Agreement
-
Goldwasser, S., Lindell, Y.: Secure Computation Without Agreement. Journal of Cryptology 18(3), 247-287 (2005)
-
(2005)
Journal of Cryptology
, vol.18
, Issue.3
, pp. 247-287
-
-
Goldwasser, S.1
Lindell, Y.2
-
17
-
-
33847139020
-
On the Composition of Authenticated Byzantine Agreement
-
Lindell, Y., Lysysanskaya, A., Rabin, T.: On the Composition of Authenticated Byzantine Agreement. Journal of the ACM 53(6), 881-917 (2006)
-
(2006)
Journal of the ACM
, vol.53
, Issue.6
, pp. 881-917
-
-
Lindell, Y.1
Lysysanskaya, A.2
Rabin, T.3
-
18
-
-
43149113579
-
Secure Protocols with Invisible Trusted Parties
-
Weizmann Institute of Science, Israel June
-
Micali, S.: Secure Protocols with Invisible Trusted Parties. Presentation on Multi-Party Secure Protocols, Weizmann Institute of Science, Israel (June 1998)
-
(1998)
Presentation on Multi-Party Secure Protocols
-
-
Micali, S.1
-
19
-
-
1142268855
-
Simple and Fast Optimistic Protocols for Fair Electronic Exchange
-
Micali, S.: Simple and Fast Optimistic Protocols for Fair Electronic Exchange. In: 22nd PODC, pp. 12-19 (2003)
-
(2003)
22nd PODC
, pp. 12-19
-
-
Micali, S.1
-
20
-
-
35248883427
-
Fair Secure Two-Party Computation
-
Biham, E, ed, EURO-CRYPT 2003, Springer, Heidelberg
-
Pinkas, B.: Fair Secure Two-Party Computation. In: Biham, E. (ed.) EURO-CRYPT 2003. LNCS, vol. 2656, pp. 87-105. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 87-105
-
-
Pinkas, B.1
-
21
-
-
0022882770
-
How to Generate and Exchange Secrets
-
Yao, A.: How to Generate and Exchange Secrets. In: 27th FOCS, pp. 162-167 (1986)
-
(1986)
27th FOCS
, pp. 162-167
-
-
Yao, A.1
|