-
1
-
-
33749546004
-
Asymptotically optimal two-round perfectly secure message transmission
-
Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
Agarwal, S., Cramer, R., de Haan, R.: Asymptotically optimal two-round perfectly secure message transmission. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
-
-
Agarwal, S.1
Cramer, R.2
de Haan, R.3
-
2
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
May
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proc. 20th Annual ACM Symposium of the Theory of Computation, pp. 1-10 (May 1988)
-
(1988)
Proc. 20th Annual ACM Symposium of the Theory of Computation
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
0029405656
-
Generalized privacy amplification
-
Bennett, C.H., Brassard, G., Crèpeau, C., Maurer, U.: Generalized privacy amplification. IEEE Transactions on Information Theory 41(6), 1015-1923 (1995)
-
(1995)
IEEE Transactions on Information Theory
, vol.41
, Issue.6
, pp. 1015-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crèpeau, C.3
Maurer, U.4
-
4
-
-
0023985539
-
Privacy amplification by public discussion
-
April
-
Bennett, C.H., Brassard, G., Robert, J.M.: Privacy amplification by public discussion. Siam Journal of Computing 17(2) (April 1988)
-
(1988)
Siam Journal of Computing
, vol.17
, Issue.2
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.M.3
-
5
-
-
79959304001
-
Fast consensus in networks of bounded degree. WDAG 1990
-
Preliminary version in WDAG
-
Berman, P., Garay, J.: Fast consensus in networks of bounded degree. WDAG 1990 2(7), 62-73 (1993); Preliminary version in WDAG 1990
-
(1990)
, vol.2
, Issue.7
, pp. 62-73
-
-
Berman, P.1
Garay, J.2
-
6
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
STOC, Association for Computing Machinery May
-
Chaum, D., Crepeau, C., Damgard, I.: Multiparty unconditionally secure protocols. In: Proceedings 20th Annual Symposium on Theory of Computing, STOC, Association for Computing Machinery (May 1988)
-
(1988)
Proceedings 20th Annual Symposium on Theory of Computing
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
7
-
-
0022199386
-
Verifiable secret sharing and simultaneous broadcast
-
Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: Verifiable secret sharing and simultaneous broadcast. In: Proc. 26th Annual IEEE Symposium on Foundations of Computer Science, pp. 383-395 (1985)
-
(1985)
Proc. 26th Annual IEEE Symposium on Foundations of Computer Science
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
8
-
-
84888077711
-
Perfectly secure message transmission revisited
-
Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
-
Desmedt, Y., Wang, Y.: Perfectly secure message transmission revisited. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 502-517. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 502-517
-
-
Desmedt, Y.1
Wang, Y.2
-
9
-
-
0009768331
-
The byzantine generals strike again
-
Dolev, D.: The byzantine generals strike again. Journal of Algorithms 1(3), 14-30 (1982)
-
(1982)
Journal of Algorithms
, vol.1
, Issue.3
, pp. 14-30
-
-
Dolev, D.1
-
10
-
-
0027341860
-
Perfectly secure message transmission
-
Dolev, D., Dwork, C., Waarts, O., Young, M.: Perfectly secure message transmission. Journal of ACM 1(40), 17-47 (1993)
-
(1993)
Journal of ACM
, vol.1
, Issue.40
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Young, M.4
-
11
-
-
0042033407
-
Fault tolerance in networks of bounded degree
-
Dwork, C., Peleg, D., Pippinger, N., Upfal, E.: Fault tolerance in networks of bounded degree. In: Proc. 18th Annual Symposium on the Theory of Computing, pp. 370-379 (1986)
-
(1986)
Proc. 18th Annual Symposium on the Theory of Computing
, pp. 370-379
-
-
Dwork, C.1
Peleg, D.2
Pippinger, N.3
Upfal, E.4
-
12
-
-
38049004833
-
-
Fitzi, M., Franklin, M., Garay, J., Vardhan, S.H.: Towards optimal and efficient perfectly secure message transmission. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, Springer, Heidelberg (2007)
-
Fitzi, M., Franklin, M., Garay, J., Vardhan, S.H.: Towards optimal and efficient perfectly secure message transmission. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, Springer, Heidelberg (2007)
-
-
-
-
13
-
-
33745550878
-
-
Fitzi, M., Garay, J., Gollakota, S., Rangan, C.P., Srinathan, K.: Round-optimal and efficient verifiable secret sharing. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 329-342. Springer, Heidelberg (2006)
-
Fitzi, M., Garay, J., Gollakota, S., Rangan, C.P., Srinathan, K.: Round-optimal and efficient verifiable secret sharing. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 329-342. Springer, Heidelberg (2006)
-
-
-
-
14
-
-
44449153600
-
Trading correctness for privacy in unconditional mpc
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Fitzi, M., Hirt, M., Maurer, U.: Trading correctness for privacy in unconditional mpc. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
-
-
Fitzi, M.1
Hirt, M.2
Maurer, U.3
-
15
-
-
84957653101
-
Secure communications in minimal connectivity models
-
Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
-
Franklin, M.K., Wright, R.N.: Secure communications in minimal connectivity models. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 346-360. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 346-360
-
-
Franklin, M.K.1
Wright, R.N.2
-
16
-
-
0012525797
-
-
Garay, J., Moses, Y.: Fully polynomial Byzantine agreement for n > 3t processors in t + 1 rounds. SIAM J. Comput. 27(1), 247-290 (1998); Preliminary version in STOC 1992
-
Garay, J., Moses, Y.: Fully polynomial Byzantine agreement for n > 3t processors in t + 1 rounds. SIAM J. Comput. 27(1), 247-290 (1998); Preliminary version in STOC 1992
-
-
-
-
17
-
-
44449130974
-
-
Garay, J., Ostrovsky, R., Vaya, S.: Almost-eveywhere secure computation. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, Springer, Heidelberg (2007)
-
Garay, J., Ostrovsky, R., Vaya, S.: Almost-eveywhere secure computation. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, Springer, Heidelberg (2007)
-
-
-
-
18
-
-
44449101724
-
Almost-eveywhere secure computation
-
Bertinoro, Italy March
-
Garay, J., Ostrovsky, R., Vaya, S.: Almost-eveywhere secure computation. In: Presentation at the 2007 Workshop on Cryptographic Protocols WCP 2007, Bertinoro, Italy (March 2007)
-
(2007)
Presentation at the 2007 Workshop on Cryptographic Protocols WCP
-
-
Garay, J.1
Ostrovsky, R.2
Vaya, S.3
-
19
-
-
21144464689
-
-
Garay, J., Perry, K.: A continuum of failure models for distributed computing. In: Segall, A., Zaks, S. (eds.) WDAG 1992. LNCS, 647, pp. 153-165. Springer, Heidelberg (1992)
-
Garay, J., Perry, K.: A continuum of failure models for distributed computing. In: Segall, A., Zaks, S. (eds.) WDAG 1992. LNCS, vol. 647, pp. 153-165. Springer, Heidelberg (1992)
-
-
-
-
20
-
-
84937440738
-
On 2-round secure multiparty computation
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Gennaro, R., Ishai, Y., Kushilevitz, E., Rabin, T.: On 2-round secure multiparty computation. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
-
-
Gennaro, R.1
Ishai, Y.2
Kushilevitz, E.3
Rabin, T.4
-
21
-
-
0023545076
-
How to play any mental game or a completeness theorem for orotocols with honest majority
-
May
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for orotocols with honest majority. In: Proc. 19th Annual ACM Symposium on Theory of Computation, pp. 218-229 (May 1987)
-
(1987)
Proc. 19th Annual ACM Symposium on Theory of Computation
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
22
-
-
44449096177
-
-
Goldreich, O, Secure multi-party computation, final (incomplete) draft, version 1.4 2002
-
Goldreich, O.: Secure multi-party computation, final (incomplete) draft, version 1.4 (2002)
-
-
-
-
23
-
-
0033725451
-
Reducibility and completeness in private computations
-
Kilian, J., Kushilevitz, E., Micali, S., Ostrovsky, R.: Reducibility and completeness in private computations. SIAM Journal on Computing 29 (1999)
-
(1999)
SIAM Journal on Computing
, vol.29
-
-
Kilian, J.1
Kushilevitz, E.2
Micali, S.3
Ostrovsky, R.4
-
24
-
-
44449103750
-
Truly efficient 2-round perfectly secure message transmission scheme
-
These proceedings
-
Kurosawa, K., Suzuki, K.: Truly efficient 2-round perfectly secure message transmission scheme. These proceedings
-
-
-
Kurosawa, K.1
Suzuki, K.2
-
25
-
-
84976699318
-
The Byzantine generals problem
-
July
-
Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Transactions on Programming Languages and Systems, 382-401 (July 1982)
-
(1982)
ACM Transactions on Programming Languages and Systems
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
26
-
-
84976810569
-
Reaching agreement in the presence of faults. Journal of the ACM, JACM
-
April
-
Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. Journal of the ACM, JACM 27(2) (April 1980)
-
(1980)
, vol.27
, Issue.2
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
28
-
-
0012527611
-
Efficient perfectly secure message transmission in synchronous networks
-
Sayeed, H., Abu-Amara, H.: Efficient perfectly secure message transmission in synchronous networks. Information and Computation 1(126), 53-61 (1996)
-
(1996)
Information and Computation
, vol.1
, Issue.126
, pp. 53-61
-
-
Sayeed, H.1
Abu-Amara, H.2
-
29
-
-
35048814566
-
Optimal perfectly secure message transmission
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Srinathan, K., Narayanan, A., Pandu Rangan, C.: Optimal perfectly secure message transmission. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 545-561. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 545-561
-
-
Srinathan, K.1
Narayanan, A.2
Pandu Rangan, C.3
-
31
-
-
44449153089
-
-
Ph.D. Thesis, University of California at Los Angeles, California December
-
Vaya, S.: Almost-everywhere secure computation. Ph.D. Thesis, University of California at Los Angeles, California (December 2006)
-
(2006)
Almost-everywhere secure computation
-
-
Vaya, S.1
-
32
-
-
44449110651
-
Secure computation on incomplete networks. In: Cryptology ePrint archive
-
Report 2007/346 September
-
Vaya, S.: Secure computation on incomplete networks. In: Cryptology ePrint archive, Report 2007/346 (September 2007)
-
(2007)
-
-
Vaya, S.1
|