-
1
-
-
85029542707
-
Foundations of Secure Interactive Computing
-
Crypto '91, Springer-Verlag
-
D. Beaver. Foundations of Secure Interactive Computing. In Crypto '91, Springer-Verlag (LNCS 576), pages 377-391, 1991.
-
(1991)
LNCS
, vol.576
, pp. 377-391
-
-
Beaver, D.1
-
2
-
-
33746365751
-
Secure Multi-Party Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority
-
D. Beaver. Secure Multi-Party Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority. Journal of Cryptology 4(2):75-122, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.2
, pp. 75-122
-
-
Beaver, D.1
-
3
-
-
0024769014
-
Multiparty Computation with Faulty Majority
-
D. Beaver and S. Goldwasser. Multiparty Computation with Faulty Majority. In 30th FOCS, pages 468-473, 1989.
-
(1989)
30th FOCS
, pp. 468-473
-
-
Beaver, D.1
Goldwasser, S.2
-
4
-
-
84957064831
-
The AU-or-Nothing Nature of Two-Party Secure Computation
-
Crypto '99, Springer-Verlag
-
A Beimel, T. Malkin, and S. Micali. The AU-or-Nothing Nature of Two-Party Secure Computation. In Crypto '99, Springer-Verlag (LNCS 1666), pages 80-97, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 80-97
-
-
Beimel, A.1
Malkin, T.2
Micali, S.3
-
5
-
-
84898960610
-
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In 20th STOC, pages 1-10, 1988.
-
(1988)
20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
84974588386
-
Timed Commitments
-
Crypto 2000, Springer-Verlag
-
D. Boneh and M. Naor. Timed Commitments. In Crypto 2000, Springer-Verlag (LNCS 1880), pages 236-254, 2000.
-
(2000)
LNCS
, vol.1880
, pp. 236-254
-
-
Boneh, D.1
Naor, M.2
-
7
-
-
0000731055
-
Security and Composition of Multiparty Cryptographic Protocols
-
R. Canetti. Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology 13(1): 143-202, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
8
-
-
84898947315
-
Multi-party Unconditionally Secure Protocols
-
D. Chaum, C. Crépeau, and I. Damg̊ard. Multi-party Unconditionally Secure Protocols. In 20th STOC, pages 11-19, 1988.
-
(1988)
20th STOC
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damg̊ard, I.3
-
10
-
-
0012610677
-
Limits on the Security of Coin Flips when Half the Processors are Faulty
-
R. Cleve. Limits on the Security of Coin Flips when Half the Processors are Faulty. In 18th STOC, pages 364-369, 1986.
-
(1986)
18th STOC
, pp. 364-369
-
-
Cleve, R.1
-
11
-
-
0001683636
-
Authenticated Algorithms for Byzantine Agreement
-
D. Dolev and H. Strong. Authenticated Algorithms for Byzantine Agreement. SIAM Journal on Computing, 12(4):656-666, 1983.
-
(1983)
SIAM Journal on Computing
, vol.12
, Issue.4
, pp. 656-666
-
-
Dolev, D.1
Strong, H.2
-
13
-
-
84976655650
-
Cryptographic Computation: Secure Fault Tolerant Protocols and the Public Key Model
-
Crypto '87, Springer-Verlag
-
Z. Galil, S. Haber, and M. Yung. Cryptographic Computation: Secure Fault Tolerant Protocols and the Public Key Model. In Crypto '87, Springer-Verlag (LNCS 293), pages 135-155, 1988.
-
(1988)
LNCS
, vol.293
, pp. 135-155
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
14
-
-
33745536762
-
Resource Fairness and Composability of Cryptographic Protocols
-
3rd TCC, Springer-Verlag
-
J. Garay, P. MacKenzie, M. Prabhakaran, and K. Yang. Resource Fairness and Composability of Cryptographic Protocols. In 3rd TCC, Springer-Verlag (LNCS 3876), pages 404-428, 2006.
-
(2006)
LNCS
, vol.3876
, pp. 404-428
-
-
Garay, J.1
MacKenzie, P.2
Prabhakaran, M.3
Yang, K.4
-
16
-
-
0023545076
-
-
O. Goldreich, S. Micali, and A. Wigderson. How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In 19th STOC, pages 218-229, 1987.
-
O. Goldreich, S. Micali, and A. Wigderson. How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In 19th STOC, pages 218-229, 1987.
-
-
-
-
17
-
-
84955564077
-
Fair Computation of General Functions in Presence of Immoral Majority
-
Crypto '90, Springer-Verlag
-
S. Goldwasser and L. Levin. Fair Computation of General Functions in Presence of Immoral Majority. In Crypto '90, Springer-Verlag (LNCS 537), pages 77-93, 1990.
-
(1990)
LNCS
, vol.537
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
19
-
-
57049164553
-
-
J. Kilian. A General Completeness Theorem for Two-Party Games. In 23rd STOC, pages 553-560, 1991.
-
J. Kilian. A General Completeness Theorem for Two-Party Games. In 23rd STOC, pages 553-560, 1991.
-
-
-
-
20
-
-
0033706604
-
-
J. Kilian. More General Completeness Theorems for Secure Two-Party Computation. In 32nd STOC, pages 316-324, 2000.
-
J. Kilian. More General Completeness Theorems for Secure Two-Party Computation. In 32nd STOC, pages 316-324, 2000.
-
-
-
-
21
-
-
4544235438
-
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
-
Y. Lindell. Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. Journal of Cryptology 16(3): 143-184, 2003.
-
(2003)
Journal of Cryptology
, vol.16
, Issue.3
, pp. 143-184
-
-
Lindell, Y.1
-
22
-
-
0020889143
-
-
M. Luby, S. Micali and C. Rackoff. How to Simultaneously Exchange a Secret Bit by Flipping a Symmetrically-Biased Coin. In 24th FOCS, pages 11-21, 1983.
-
M. Luby, S. Micali and C. Rackoff. How to Simultaneously Exchange a Secret Bit by Flipping a Symmetrically-Biased Coin. In 24th FOCS, pages 11-21, 1983.
-
-
-
-
23
-
-
84974655726
-
-
S. Micali and P. Rogaway. Secure Computation. Unpublished manuscript, 1992. Preliminary version in Crypto '91, Springer-Verlag (LNCS 576), pages 392-404, 1991.
-
S. Micali and P. Rogaway. Secure Computation. Unpublished manuscript, 1992. Preliminary version in Crypto '91, Springer-Verlag (LNCS 576), pages 392-404, 1991.
-
-
-
-
24
-
-
84976810569
-
Reaching Agreement in the Presence of Faults
-
M. Pease, R. Shostak, and L. Lamport. Reaching Agreement in the Presence of Faults. Journal of the ACM 27(2):228-234, 1980.
-
(1980)
Journal of the ACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
25
-
-
35248883427
-
Fair Secure Two-Party Computation
-
Eurocrypt 2003, Springer-Verlag
-
B. Pinkas. Fair Secure Two-Party Computation. In Eurocrypt 2003, Springer-Verlag (LNCS 2656), pages 87-105, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 87-105
-
-
Pinkas, B.1
-
26
-
-
0024859552
-
Verifiable Secret Sharing and Multi-party Protocols with Honest Majority
-
T. Rabin and M. Ben-Or. Verifiable Secret Sharing and Multi-party Protocols with Honest Majority. In 21st STOC, pages 73-85, 1989.
-
(1989)
21st STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
27
-
-
0022882770
-
How to Generate and Exchange Secrets
-
A. Yao. How to Generate and Exchange Secrets. In 27th FOCS, pages 162-167, 1986.
-
(1986)
27th FOCS
, pp. 162-167
-
-
Yao, A.1
|