-
6
-
-
84864708144
-
Multiparty computations ensuring privacy of each party's input and correctness of the result
-
volume 293 of Lecture Notes in Computer Science, Springer-Verlag, [CDG87]
-
[CDG87] D. Chaum, I. Damgård, and J. van de Graaf. Multiparty computations ensuring privacy of each party's input and correctness of the result. In Advances in Cryptology-CRYPTO '87, volume 293 of Lecture Notes in Computer Science, pages 87-119. Springer-Verlag, 1987.
-
(1987)
Advances in Cryptology-CRYPTO '87
, pp. 87-119
-
-
Chaum, D.1
Damgård, I.2
van de Graaf, J.3
-
8
-
-
0029723583
-
Adaptively secure multiparty computation
-
Nov. [CFGN96]
-
[CFGN96] R. Canetti, U. Feige, O. Goldreich, and M. Naor. Adaptively secure multiparty computation. In Proc. 28th ACM Symposium on the Theory of Computing (STOC), pages 639-648, Nov. 1996.
-
(1996)
Proc. 28th ACM Symposium on the Theory of Computing (STOC)
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
9
-
-
77951106449
-
Multiauthority secret-ballot elections with linear work
-
volume 1070 of Lecture Notes in Computer Science. IACR, Springer-Verlag, May 1996. [CFSY96]
-
[CFSY96] R. Cramer, M. K. Franklin, B. Schoenmakers, and M. Yung. Multiauthority secret-ballot elections with linear work. In Advances in Cryptology-EUROCRYPT '96, volume 1070 of Lecture Notes in Computer Science, pages 72-83. IACR, Springer-Verlag, May 1996.
-
Advances in Cryptology-EUROCRYPT '96
, pp. 72-83
-
-
Cramer, R.1
Franklin, M.K.2
Schoenmakers, B.3
Yung, M.4
-
11
-
-
0029541045
-
Private information retrieval
-
Oct. [CGKS95]
-
[CGKS95] B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In Proc. 36th IEEE Symposium on the Foundations of Computer Science (FOCS), pages 41-51, Oct. 1995.
-
(1995)
Proc. 36th IEEE Symposium on the Foundations of Computer Science (FOCS)
, pp. 41-51
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
12
-
-
84957649042
-
Committed oblivious transfer and private multi-party computation
-
volume 963 of Lecture Notes in Computer Science, Springer-Verlag. [CGT95]
-
[CGT95] C. Crépeau, J. van de Graaf, and A. Tapp. Committed oblivious transfer and private multi-party computation. In Advances in Cryptology-CRYPTO '95, volume 963 of Lecture Notes in Computer Science, pages 110-123. Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology-CRYPTO '95
, pp. 110-123
-
-
Crépeau, C.1
van de Graaf, J.2
Tapp, A.3
-
13
-
-
85032861451
-
The spymasters double-agent problem
-
volume 435 of Lecture Notes in Computer Science, Springer-Verlag. [Cha89]
-
[Cha89] D. Chaum. The spymasters double-agent problem. In Advances in Cryptology-CRYPTO '89, volume 435 of Lecture Notes in Computer Science, pages 591-602. Springer-Verlag, 1989.
-
(1989)
Advances in Cryptology-CRYPTO '89
, pp. 591-602
-
-
Chaum, D.1
-
14
-
-
0027341860
-
Perfectly secure message transmission
-
Jan. [DDWY93]
-
[DDWY93] D. Dolev, C. Dwork, O. Waarts, and M. Yung. Perfectly secure message transmission. Journal of the ACM, 40(l):17-47, Jan. 1993.
-
(1993)
Journal of the ACM
, vol.40
, Issue.1
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
15
-
-
84936167251
-
Strong verifiable secret sharing
-
volume 486 of Lecture Notes in Computer Science, Springer-Verlag. [Dwo90]
-
[Dwo90] C. Dwork. Strong verifiable secret sharing. In Proc. International Workshop on Distributed Algorithms '90, volume 486 of Lecture Notes in Computer Science, pages 213-227. Springer-Verlag, 1990.
-
(1990)
Proc. International Workshop on Distributed Algorithms '90
, pp. 213-227
-
-
Dwork, C.1
-
18
-
-
0001710760
-
The design and implementation of a secure auction service
-
May [FR96]
-
[FR96] M. K. Franklin and M. K. Reiter. The design and implementation of a secure auction service. IEEE Transactions on Software Engineering, 22(5):302-312, May 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.5
, pp. 302-312
-
-
Franklin, M.K.1
Reiter, M.K.2
-
21
-
-
84976655650
-
Cryptographic computation: Secure fault-tolerant protocols and the public-key model
-
volume 293 of Lecture Notes in Computer Science. Springer-Verlag. [GHY87]
-
[GHY87] Z. Galil, S. Haber, and M. Yung. Cryptographic computation: Secure fault-tolerant protocols and the public-key model. In Advances in Cryptology-CRYPTO '87, volume 293 of Lecture Notes in Computer Science, pages 135-155. Springer-Verlag, 1987.
-
(1987)
Advances in Cryptology-CRYPTO '87
, pp. 135-155
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
22
-
-
84947441722
-
Robust and efficient sharing of RSA functions
-
volume 1109 of Lecture Notes in Computer Science, Springer-Verlag, Aug. [GJKR96a]
-
[GJKR96a] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust and efficient sharing of RSA functions. In Advances in Cryptology-CRYPTO '96, volume 1109 of Lecture Notes in Computer Science, pages 157-172. Springer-Verlag, Aug. 1996.
-
(1996)
Advances in Cryptology-CRYPTO '96
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
23
-
-
84947926543
-
Robust threshold DSS signatures
-
volume 1070 of Lecture Notes in Computer Science, Springer-Verlag, May [GJKR96b]
-
[GJKR96b] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. In Advances in Cryptology-EUROCRYPT '96, volume 1070 of Lecture Notes in Computer Science, pages 354-371. Springer-Verlag, May 1996.
-
(1996)
Advances in Cryptology-EUROCRYPT '96
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
31
-
-
84976699318
-
The Byzantine generals problem
-
July [LSP82]
-
[LSP82] L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3):382-401, July 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
33
-
-
0019608784
-
On sharing secrets and Reed-Solomon codes
-
[MS81]
-
[MS81] R. J. McEliece and D. V. Sarwate. On sharing secrets and Reed-Solomon codes. Communications of the ACM, 24:583-584, 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 583-584
-
-
McEliece, R.J.1
Sarwate, D.V.2
-
35
-
-
0027961556
-
How to share a function securely
-
[SDFY94]
-
[SDFY94] A. de Santis, Y. Desmedt, Y. Frankel, and M. Yung. How to share a function securely. In Proc. 26th ACM Symposium on the Theory of Computing (STOC), pages 522-533, 1994.
-
(1994)
Proc. 26th ACM Symposium on the Theory of Computing (STOC)
, pp. 522-533
-
-
de Santis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
36
-
-
0018545449
-
How to share a secret
-
[Sha79]
-
[Sha79] A. Shamir. How to share a secret. Communications of the ACM, 22:612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
|