-
1
-
-
0035166072
-
How to go beyond the black-box simulation barrier
-
B. Barak. How to go Beyond the Black-Box Simulation Barrier. In 42nd FOCS, pages 106-115, 2001.
-
(2001)
42nd FOCS
, pp. 106-115
-
-
Barak, B.1
-
2
-
-
0036949106
-
Constant-round coin-tossing or realizing the shared-random string model
-
B. Barak. Constant-Round Coin-Tossing or Realizing the Shared-Random String Model. In 43rd FOCS, pages 345-355, 2002.
-
(2002)
43rd FOCS
, pp. 345-355
-
-
Barak, B.1
-
3
-
-
0036294828
-
Universal arguments and their applications
-
B. Barak and O. Goldreich. Universal Arguments and their Applications. 17th CCC, pages 194-203, 2002.
-
(2002)
17th CCC
, pp. 194-203
-
-
Barak, B.1
Goldreich, O.2
-
4
-
-
0036041101
-
Strict polynomial-time in simulation and extraction
-
B. Barak and Y. Lindell. Strict Polynomial-Time in Simulation and Extraction. In 34th STOC, pages 484-493, 2002.
-
(2002)
34th STOC
, pp. 484-493
-
-
Barak, B.1
Lindell, Y.2
-
5
-
-
85029542707
-
Foundations of secure interactive computing
-
Springer-Verlag (LNCS 576)
-
D. Beaver. Foundations of Secure Interactive Computing. In Crypto'91, Springer-Verlag (LNCS 576), pages 377-391, 1991.
-
(1991)
Crypto'91
, pp. 377-391
-
-
Beaver, D.1
-
6
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
D. Ben-Or, S. Goldwasser and A. Wigderson. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In 20'th STOC, pages 1-10, 1988.
-
(1988)
20'th STOC
, pp. 1-10
-
-
Ben-Or, D.1
Goldwasser, S.2
Wigderson, A.3
-
7
-
-
0025137207
-
The round complexity of secure protocols
-
D. Beaver, S. Micali and P. Rogaway The Round Complexity of Secure Protocols. In 22'th STOC, pages 503-513, 1990.
-
(1990)
22'th STOC
, pp. 503-513
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
8
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology, 13(1): 143-202, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
9
-
-
0038721038
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 34th STOC, pages 494-503, 2002.
-
(2002)
34th STOC
, pp. 494-503
-
-
Canetti, R.1
-
11
-
-
35248854495
-
On the Limitations of universally composable two-party computation without set-up assumptions
-
Springer LNCS 2656
-
R. Canetti, E. Kushilevitz and Y. Lindell. On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions. In EuroCrypt'03, Springer LNCS 2656, pages 68-86, 2003.
-
(2003)
EuroCrypt'03
, pp. 68-86
-
-
Canetti, R.1
Kushilevitz, E.2
Lindell, Y.3
-
12
-
-
0037605775
-
Black-box concurrent zero-knowledge requires (almost) logarithmically many rounds
-
R. Canetti, J. Kilian, E. Petrank and A. Rosen. Black-Box Concurrent Zero-Knowledge Requires (almost) Logarithmically Many Rounds. SIAM Jour. on Computing, Vol. 32(1), pages 1-47, 2002.
-
(2002)
SIAM Jour. on Computing
, vol.32
, Issue.1
, pp. 1-47
-
-
Canetti, R.1
Kilian, J.2
Petrank, E.3
Rosen, A.4
-
13
-
-
0036038991
-
Universally composable two-party and multy-party computation
-
R. Canetti, Y. Lindell, R. Ostrovsky and A. Sahai. Universally Composable Two-Party and Multy-Party Computation. In 34th STOC, pages 494-503,2002.
-
(2002)
34th STOC
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
14
-
-
84949308005
-
Achieving independence in logarithmic number of rounds
-
B. Chor, M. Rabin. Achieving Independence in Logarithmic Number of Rounds. In 6th PODC, pages 260-268, 1987.
-
(1987)
6th PODC
, pp. 260-268
-
-
Chor, B.1
Rabin, M.2
-
15
-
-
84948970500
-
Efficient concurrent zero-knowledge in the auxiliary string model
-
LNCS 1807
-
I. Damgård. Efficient Concurrent Zero-Knowledge in the Auxiliary String Model. In EuroCrypt'00, LNCS 1807, pages 418-430, 2000.
-
(2000)
EuroCrypt'00
, pp. 418-430
-
-
Damgård, I.1
-
16
-
-
0343337504
-
Non-malleable cryptography
-
D. Dolev, C. Dwork and M. Naor. Non-Malleable Cryptography. SIAM Jour. on Computing, Vol. 30(2), pages 391-437, 2000.
-
(2000)
SIAM Jour. on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
17
-
-
0031632567
-
Concurrent zero-knowledge
-
C. Dwork, M. Naor and A. Sahai. Concurrent Zero-Knowledge. In 30th STOC, pages 409-418, 1998.
-
(1998)
30th STOC
, pp. 409-418
-
-
Dwork, C.1
Naor, M.2
Sahai, A.3
-
18
-
-
0024984004
-
Witness indistinguishability and witness hiding protocols
-
U. Feige and A. Shamir. Witness Indistinguishability and Witness Hiding Protocols. In 22nd STOC, pages 416-426, 1990.
-
(1990)
22nd STOC
, pp. 416-426
-
-
Feige, U.1
Shamir, A.2
-
20
-
-
0029767165
-
On the composition of zero-knowledge proof systems
-
O. Goldreich and H. Krawczyk. On the Composition of Zero-Knowledge Proof Systems. SIAM Jour. on Computing, Vol. 25(1), pages 169-192, 1996.
-
(1996)
SIAM Jour. on Computing
, vol.25
, Issue.1
, pp. 169-192
-
-
Goldreich, O.1
Krawczyk, H.2
-
21
-
-
71149116146
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
-
O. Goldreich, S. Micali and A. Wigderson. Proofs that Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems. JACM. Vol. 38(1), pp. 691-729, 1991.
-
(1991)
JACM
, vol.38
, Issue.1
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
22
-
-
0023545076
-
How to Play any mental game - A completeness theorem for protocols with honest majority
-
O. Goldreich, S. Micali and A. Wigderson. How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In 19th STOC, pages 218-229, 1987.
-
(1987)
19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
23
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
Springer-Verlag (LNCS 537)
-
S. Goldwasser and L. Levin. Fair Computation of General Functions in Presence of Immoral Majority. In Crypto'90, Springer-Verlag (LNCS 537), pages 77-93, 1990.
-
(1990)
Crypto'90
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
24
-
-
84947284060
-
Secure computation without agreement
-
Springer-Verlag (LNCS 2508)
-
S. Golwasser and Y. Lindell Secure Computation without Agreement. In 16th DISC, Springer-Verlag (LNCS 2508), pages 17-32, 2002.
-
(2002)
16th DISC
, pp. 17-32
-
-
Golwasser, S.1
Lindell, Y.2
-
25
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
J. Håstad, R. Impagliazzo, L.A. Levin and M. Luby. A Pseudorandom Generator from any One-way Function. SIAM Jour. on Computing, Vol. 28 (4), pages 1364-1396, 1999.
-
(1999)
SIAM Jour. on Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
26
-
-
33749018100
-
Round efficiency of multi-party computation with a dishonest majority
-
Springer LNCS 2656
-
J. Katz, R. Ostrovsky and A. Smith. Round Efficiency of Multi-Party Computation with a Dishonest Majority, In EuroCrypt'03. Springer LNCS 2656 pages 578-595, 2003.
-
(2003)
EuroCrypt'03
, pp. 578-595
-
-
Katz, J.1
Ostrovsky, R.2
Smith, A.3
-
27
-
-
0038446804
-
Bounded-concurrent secure two-party computation without setup assumptions
-
Y. Lindell. Bounded-Concurrent Secure Two-Party Computation Without Setup Assumptions. In 35th STOC, pages 683-692, 2003.
-
(2003)
35th STOC
, pp. 683-692
-
-
Lindell, Y.1
-
28
-
-
0345412673
-
General composition and universal composability in secure multi-party computation
-
Y. Lindell. General Composition and Universal Composability in Secure Multi-Party Computation. In 44th FOCS, pages 394-403, 2003
-
(2003)
44th FOCS
, pp. 394-403
-
-
Lindell, Y.1
-
29
-
-
35048903637
-
Lower bounds for concurrent self composition
-
Y. Lindell. Lower Bounds for Concurrent Self Composition. In 1st TCC, pages 203-222, 2004.
-
(2004)
1st TCC
, pp. 203-222
-
-
Lindell, Y.1
-
30
-
-
84974655726
-
Secure computation
-
Unpublished manuscript, 1992. Preliminary version, Springer-Verlag (LNCS 576)
-
S. Micali and P. Rogaway. Secure computation. Unpublished manuscript, 1992. Preliminary version in Crypto'91, Springer-Verlag (LNCS 576), pages 392-404, 1991.
-
(1991)
Crypto'91
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
31
-
-
35248825608
-
On deniability in the common reference string and random oracle model
-
Springer LNCS 2729
-
R. Pass. On Deniability in the Common Reference String and Random Oracle Model. In Crypto'03, Springer LNCS 2729, pages 316-337, 2003.
-
(2003)
Crypto'03
, pp. 316-337
-
-
Pass, R.1
-
32
-
-
0344118869
-
Bounded-concurrent secure two-party computation in a constant number of rounds
-
R. Pass, A. Rosen. Bounded-Concurrent Secure Two-Party Computation in a Constant Number of Rounds. In 44th FOCS, pages 404-413, 2003.
-
(2003)
44th FOCS
, pp. 404-413
-
-
Pass, R.1
Rosen, A.2
-
34
-
-
0024859552
-
Verifiable secret sharing and multi-party Protocols with honest majority
-
T. Rabin and M. Ben-Or. Verifiable Secret Sharing and Multi-party Protocols with Honest Majority. In 21st STOC, pages 73-85, 1989.
-
(1989)
21st STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
35
-
-
84957621865
-
On the concurrent composition of zero-knowledge proofs
-
Springer LNCS 1592
-
R. Richardson and J. Kilian. On the Concurrent Composition of Zero-Knowledge Proofs. In EuroCrypt'99, Springer LNCS 1592, pages 415-431, 1999.
-
(1999)
EuroCrypt'99
, pp. 415-431
-
-
Richardson, R.1
Kilian, J.2
-
37
-
-
0033342534
-
Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security
-
A. Sahai. Non-Malleable Non-Interactive Zero Knowledge and Adaptive Chosen-Ciphertext Security. In 40th FOCS, pages 543-553, 1999.
-
(1999)
40th FOCS
, pp. 543-553
-
-
Sahai, A.1
-
38
-
-
0022882770
-
How to generate and exchange secrets
-
A. Yao. How to Generate and Exchange Secrets. In 27th FOCS, pages 162-167, 1986.
-
(1986)
27th FOCS
, pp. 162-167
-
-
Yao, A.1
|