-
1
-
-
33746365751
-
Secure multi-party protocols and zero-knowledge proof systems tolerating a faulty minority
-
[B1]
-
[B1] D. Beaver, Secure Multi-Party Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority, J. Cryptology, vol. 4, pages 75-122, 1991.
-
(1991)
J. Cryptology
, vol.4
, pp. 75-122
-
-
Beaver, D.1
-
2
-
-
84958599141
-
Plug and play encryption
-
[B2]
-
[B2] D. Beaver, Plug and Play Encryption, Proc. CRYPTO '97, pages 75-89, 1997.
-
(1997)
Proc. CRYPTO '97
, pp. 75-89
-
-
Beaver, D.1
-
4
-
-
0022880639
-
Nontransitive transfer of confidence; a perfect zero-knowledge interactive protocol for SAT and beyond
-
[BC]
-
[BC] G. Brassard and C. Crepeau, Nontransitive Transfer of Confidence: A Perfect Zero-Knowledge Interactive Protocol for SAT and Beyond, Proc. 27th FOCS, pages 188-195, 1986.
-
(1986)
Proc. 27th FOCS
, pp. 188-195
-
-
Brassard, G.1
Crepeau, C.2
-
5
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
[BGW]
-
[BGW] M. Ben-Or, S. Goldwasser, and A. Wigderson, Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation, Proc. 20th STOC, pages 1-10, 1988.
-
(1988)
Proc. 20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
0000917097
-
Cryptographic protocols provably secure against dynamic adversaries
-
[BH]
-
[BH] D. Beaver and S. Haber, Cryptographic Protocols Provably Secure Against Dynamic Adversaries, Proc. Eurocrypt '92, pages 307-323, 1992.
-
(1992)
Proc. Eurocrypt '92
, pp. 307-323
-
-
Beaver, D.1
Haber, S.2
-
7
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
[C1]
-
[C1] R. Canetti, Security and Composition of Multiparty Cryptographic Protocols, J. Cryptology, vol. 13, no. 1, pages 143-202, 2000. On-line version at http:/philby.ucsd.edu/cryptolib/1998/98-18.html.
-
(2000)
J. Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
8
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
[C2]
-
[C2] R. Canetti, Universally Composable Security: A New Paradigm for Cryptographic Protocols, Proc. 42nd FOCS, pages 136-145,2001. Full version available at http/eprint.iacr.org/2000/067.
-
(2001)
Proc. 42nd FOCS
, pp. 136-145
-
-
Canetti, R.1
-
9
-
-
84898947315
-
Multi-party unconditionally secure protocols
-
[CCD]
-
[CCD] D. Chaum, C. Crepeau, and I. Damgaard, Multi-Party Unconditionally Secure Protocols, Proc. 20th STOC, pages 11-19, 1988.
-
(1988)
Proc. 20th STOC
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgaard, I.3
-
10
-
-
84864708144
-
Multi-party computations ensuring privacy of each party's input and correctness of the result
-
[CDG]
-
[CDG] D. Chaum, I. Damgaard, and J. van de Graaf, Multi-Party Computations Ensuring Privacy of Each Party's Input and Correctness of the Result, Proc. CRYPTO '87, pages 87-119, 1987.
-
(1987)
Proc. CRYPTO '87
, pp. 87-119
-
-
Chaum, D.1
Damgaard, I.2
Van De Graaf, J.3
-
11
-
-
84948975649
-
General secure multi-party computation from any linear secret-sharing scheme
-
[CDM]
-
[CDM] R. Cramer, I. Damgaard, and U. Maurer, General Secure Multi-Party Computation from Any Linear Secret-Sharing Scheme, Proc. EuroCrypt 2000, pages 316-334, 2000.
-
(2000)
Proc. EuroCrypt 2000
, pp. 316-334
-
-
Cramer, R.1
Damgaard, I.2
Maurer, U.3
-
12
-
-
0029723583
-
Adaptively secure computation
-
[CFGN]. Fuller version in MIT-LCS-TR #682, 1996
-
[CFGN] R. Canetti, U. Feige, O. Goldreich, and M. Naor, Adaptively Secure Computation, Proc. 28th STOC, pages 639-648, 1996. Fuller version in MIT-LCS-TR #682, 1996.
-
(1996)
Proc. 28th STOC
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
13
-
-
0346528350
-
Cryptographically strong undeniable signatures, unconditionally secure for the signer
-
[CHP]
-
[CHP] D. Chaum, E. v. Heijst, and B. Pfitzmann, Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer, Proc. CRYPTO '91, pages 470-484, 1991.
-
(1991)
Proc. CRYPTO '91
, pp. 470-484
-
-
Chaum, D.1
Heijst, E.V.2
Pfitzmann, B.3
-
14
-
-
0024860209
-
A zero-one law for Boolean privacy
-
[CK]
-
[CK] B. Chor and E. Kushilevitz, A Zero-One Law for Boolean Privacy, SIAM J. Disc. Math., vol. 4, pages 36-47, 1991. Preliminary version in Proc. 21st STOC, pages 62-72, 1989.
-
(1991)
SIAM J. Disc. Math.
, vol.4
, pp. 36-47
-
-
Chor, B.1
Kushilevitz, E.2
-
15
-
-
0024860209
-
-
Preliminary version
-
[CK] B. Chor and E. Kushilevitz, A Zero-One Law for Boolean Privacy, SIAM J. Disc. Math., vol. 4, pages 36-47, 1991. Preliminary version in Proc. 21st STOC, pages 62-72, 1989.
-
(1989)
Proc. 21st STOC
, pp. 62-72
-
-
-
16
-
-
84870707379
-
A practical public-key cryptosystem provably secure against adaptive chosen ciphertext attack
-
[CS]
-
[CS] R. Cramer and V. Shoup, A Practical Public-Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack, Proc. CRYPTO '98, pages 13-25, 1998.
-
(1998)
Proc. CRYPTO '98
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
17
-
-
0343337504
-
Non-malleable cryptography
-
[DDN]
-
[DDN] D. Dolev, C. Dwork, and M. Naor, Non-Malleable Cryptography, SIAM J. Computing, vol. 30, no. 2, pp. 391-437, 2000. Preliminary version in STOC'91.
-
(2000)
SIAM J. Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
18
-
-
0343337504
-
-
Preliminary version
-
[DN] D. Dolev, C. Dwork, and M. Naor, Non-Malleable Cryptography, SIAM J. Computing, vol. 30, no. 2, pp. 391-437, 2000. Preliminary version in STOC'91.
-
STOC'91
-
-
-
19
-
-
84974597111
-
Parallel reducibility for information-theoretically secure computation
-
[DM]
-
[DM] Y. Dodis and S. Micali, Parallel Reducibility for Information-Theoretically Secure Computation, Proc. CRYPTO 2000, pages 74-92, 2000.
-
(2000)
Proc. CRYPTO 2000
, pp. 74-92
-
-
Dodis, Y.1
Micali, S.2
-
20
-
-
84974602942
-
Improved non-committing encryption schemes based on a general complexity assumption
-
[DN]
-
[DN] I. Damgaard and J. Nielsen, Improved Non-Committing Encryption Schemes Based on a General Complexity Assumption, Proc. CRYPTO 2000, pages 432-450, 2000.
-
(2000)
Proc. CRYPTO 2000
, pp. 432-450
-
-
Damgaard, I.1
Nielsen, J.2
-
23
-
-
0012527958
-
Fair computation of general functions in presence of immoral majority
-
[GL]
-
[GL] S. Goldwasser and L. Levin, Fair Computation of General Functions in Presence of Immoral Majority, Proc. CRYPTO '90, pages 77-93, 1990.
-
(1990)
Proc. CRYPTO '90
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
24
-
-
0021409284
-
Probabilistic encryption
-
[GM], April
-
[GM] S. Goldwasser and S. Micali, Probabilistic encryption, J. Comput. Systems Sci., vol. 28, no. 2, pages 270-299, April 1984.
-
(1984)
J. Comput. Systems Sci.
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
25
-
-
0023545076
-
How to play any mental game
-
[GMW]
-
[GMW] O. Goldreich, S. Micali, and A. Wigderson, How to Play Any Mental Game, Proc. 19th STOC, pages 218-229, 1987.
-
(1987)
Proc. 19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
26
-
-
0002365530
-
Privacy and communication complexity
-
[K]
-
[K] E. Kushilevitz, Privacy and Communication Complexity, SIAM J. Discrete Math., vol. 5, no. 2, pages 273-284, 1992. Preliminary version in Proc. 29th FOCS, 1989.
-
(1992)
SIAM J. Discrete Math.
, vol.5
, Issue.2
, pp. 273-284
-
-
Kushilevitz, E.1
-
27
-
-
4344686233
-
-
Preliminary version
-
[K] E. Kushilevitz, Privacy and Communication Complexity, SIAM J. Discrete Math., vol. 5, no. 2, pages 273-284, 1992. Preliminary version in Proc. 29th FOCS, 1989.
-
(1989)
Proc. 29th FOCS
-
-
-
28
-
-
0033725451
-
Reducibility and completeness in private computations
-
[KKMO]
-
[KKMO] J. Kilian, E. Kushilevitz, S. Micali, and R. Ostrovsky, Reducibility and Completeness in Private Computations, SIAM J. Computing, vol. 29, pages 1189-1208, 2000. Preliminary versions by Kilian in Proc. 23rd STOC, 1991, and by Kushilevitz, Micali, and Ostrovsky in Proc. 35th FOCS, 1994.
-
(2000)
SIAM J. Computing
, vol.29
, pp. 1189-1208
-
-
Kilian, J.1
Kushilevitz, E.2
Micali, S.3
Ostrovsky, R.4
-
29
-
-
0033725451
-
-
Preliminary versions
-
[KKMO] J. Kilian, E. Kushilevitz, S. Micali, and R. Ostrovsky, Reducibility and Completeness in Private Computations, SIAM J. Computing, vol. 29, pages 1189-1208, 2000. Preliminary versions by Kilian in Proc. 23rd STOC, 1991, and by Kushilevitz, Micali, and Ostrovsky in Proc. 35th FOCS, 1994.
-
(1991)
Proc. 23rd STOC
-
-
Kilian1
-
30
-
-
0033725451
-
-
[KKMO] J. Kilian, E. Kushilevitz, S. Micali, and R. Ostrovsky, Reducibility and Completeness in Private Computations, SIAM J. Computing, vol. 29, pages 1189-1208, 2000. Preliminary versions by Kilian in Proc. 23rd STOC, 1991, and by Kushilevitz, Micali, and Ostrovsky in Proc. 35th FOCS, 1994.
-
(1994)
Proc. 35th FOCS
-
-
Kushilevitz1
Micali2
Ostrovsky3
-
31
-
-
84974655726
-
-
[MR], unpublished manuscript
-
[MR] S. Micali and P. Rogaway, Secure Computation, unpublished manuscript, 1992. Preliminary version in Proc. CRYPTO '91, pages 392-404, 1991.
-
(1992)
Secure Computation
-
-
Micali, S.1
Rogaway, P.2
-
32
-
-
84974655726
-
-
Preliminary version
-
[MR] S. Micali and P. Rogaway, Secure Computation, unpublished manuscript, 1992. Preliminary version in Proc. CRYPTO '91, pages 392-404, 1991.
-
(1991)
Proc. CRYPTO '91
, pp. 392-404
-
-
-
33
-
-
0000845043
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
[P]
-
[P] T. P. Pedersen, Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Proc. CRYPTO '91, pages 129-140, 1991.
-
(1991)
Proc. CRYPTO '91
, pp. 129-140
-
-
Pedersen, T.P.1
-
36
-
-
0033342534
-
Non-malleable, non-interactive zero knowledge and adaptive chosen ciphertext security
-
[S]
-
[S] A. Sahai, Non-Malleable, Non-Interactive Zero Knowledge and Adaptive Chosen Ciphertext Security, Proc. 40th FOCS, pages 543-553, 1999.
-
(1999)
Proc. 40th FOCS
, pp. 543-553
-
-
Sahai, A.1
-
37
-
-
0020312165
-
Protocols for secure computation
-
[Y1]
-
[Y1] A. Yao, Protocols for Secure Computation, Proc. 23rd FOCS, pages 160-164, 1982.
-
(1982)
Proc. 23rd FOCS
, pp. 160-164
-
-
Yao, A.1
-
38
-
-
0022882770
-
How to generate and exchange secrets
-
[Y2]
-
[Y2] A. Yao, How to generate and exchange secrets, Proc. 21th FOCS, pages 162-167, 1986.
-
(1986)
Proc. 21th FOCS
, pp. 162-167
-
-
Yao, A.1
|