-
1
-
-
85048601848
-
Cryptographic protocols provably secure against dynamic adversaries
-
Advances in Cryptology - Eurocrypt '92, Springer-Verlag
-
Beaver D., and Haber S. Cryptographic protocols provably secure against dynamic adversaries. Advances in Cryptology - Eurocrypt '92. Lecture Notes in Comput. Sci. vol. 658 (1993), Springer-Verlag 307-323
-
(1993)
Lecture Notes in Comput. Sci.
, vol.658
, pp. 307-323
-
-
Beaver, D.1
Haber, S.2
-
2
-
-
0025137207
-
-
D. Beaver, S. Micali, P. Rogaway, The round complexity of secure protocols, in: 22nd Annual ACM Symposium on Theory of Computing (STOC), 1990, pp. 503-513
-
D. Beaver, S. Micali, P. Rogaway, The round complexity of secure protocols, in: 22nd Annual ACM Symposium on Theory of Computing (STOC), 1990, pp. 503-513
-
-
-
-
3
-
-
0020976844
-
-
M. Ben-Or, Another advantage of free choice: Completely asynchronous agreement protocols, in: 2nd Annual ACM Symposium on Principles of Distributed Computing (PODC), 1983, pp. 27-30
-
M. Ben-Or, Another advantage of free choice: Completely asynchronous agreement protocols, in: 2nd Annual ACM Symposium on Principles of Distributed Computing (PODC), 1983, pp. 27-30
-
-
-
-
4
-
-
0346342609
-
Resilient-optimal interactive consistency in constant time
-
Ben-Or M., and El-Yaniv R. Resilient-optimal interactive consistency in constant time. Distrib. Comput. 16 4 (2003) 249-262
-
(2003)
Distrib. Comput.
, vol.16
, Issue.4
, pp. 249-262
-
-
Ben-Or, M.1
El-Yaniv, R.2
-
5
-
-
84898960610
-
-
M. Ben-Or, S. Goldwasser, A. Wigderson, Completeness theorems for non-cryptographic fault-tolerant distributed computation, in: 20th Annual ACM Symposium on Theory of Computing (STOC), 1988, pp. 1-10
-
M. Ben-Or, S. Goldwasser, A. Wigderson, Completeness theorems for non-cryptographic fault-tolerant distributed computation, in: 20th Annual ACM Symposium on Theory of Computing (STOC), 1988, pp. 1-10
-
-
-
-
6
-
-
33748112587
-
-
M. Ben-Or, E. Pavlov, V. Vaikuntanathan, Byzantine agreement in the full-information model in O (log n) rounds, in: 38th Annual ACM Symposium on Theory of Computing (STOC), 2006, pp. 179-186
-
M. Ben-Or, E. Pavlov, V. Vaikuntanathan, Byzantine agreement in the full-information model in O (log n) rounds, in: 38th Annual ACM Symposium on Theory of Computing (STOC), 2006, pp. 179-186
-
-
-
-
7
-
-
85062838317
-
Safeguarding cryptographic keys
-
National Computer Conference, AFIPS Press
-
Blakley G. Safeguarding cryptographic keys. National Computer Conference. Lecture Notes in Comput. Sci. vol. 48 (1979), AFIPS Press 313-317
-
(1979)
Lecture Notes in Comput. Sci.
, vol.48
, pp. 313-317
-
-
Blakley, G.1
-
8
-
-
0023436302
-
An O (log n) expected rounds randomized Byzantine generals protocol
-
Bracha G. An O (log n) expected rounds randomized Byzantine generals protocol. J. ACM 34 4 (1987) 910-920
-
(1987)
J. ACM
, vol.34
, Issue.4
, pp. 910-920
-
-
Bracha, G.1
-
9
-
-
22344451864
-
Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography
-
Cachin C., Kursawe K., and Shoup V. Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography. J. Cryptology 18 3 (2005) 219-246
-
(2005)
J. Cryptology
, vol.18
, Issue.3
, pp. 219-246
-
-
Cachin, C.1
Kursawe, K.2
Shoup, V.3
-
10
-
-
0035163054
-
-
R. Canetti, Universally composable security: A new paradigm for cryptographic protocols, in: 42nd Annual IEEE Symposium on Foundations of Computer Science (FOCS), 2001, pp. 136-145
-
R. Canetti, Universally composable security: A new paradigm for cryptographic protocols, in: 42nd Annual IEEE Symposium on Foundations of Computer Science (FOCS), 2001, pp. 136-145
-
-
-
-
11
-
-
0029723583
-
-
R. Canetti, U. Feige, O. Goldreich, M. Naor, Adaptively secure multi-party computation, in: 28th Annual ACM Symposium on Theory of Computing (STOC), 1996, pp. 639-648
-
R. Canetti, U. Feige, O. Goldreich, M. Naor, Adaptively secure multi-party computation, in: 28th Annual ACM Symposium on Theory of Computing (STOC), 1996, pp. 639-648
-
-
-
-
12
-
-
0022082037
-
A simple and efficient randomized Byzantine agreement algorithm
-
Chor B., and Coan B. A simple and efficient randomized Byzantine agreement algorithm. IEEE Trans. Softw. Eng. 11 6 (1985) 531-539
-
(1985)
IEEE Trans. Softw. Eng.
, vol.11
, Issue.6
, pp. 531-539
-
-
Chor, B.1
Coan, B.2
-
13
-
-
0022199386
-
-
B. Chor, S. Goldwasser, S. Micali, B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, in: 26th Annual IEEE Symposium on the Foundations of Computer Science (FOCS), 1985, pp. 383-395
-
B. Chor, S. Goldwasser, S. Micali, B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, in: 26th Annual IEEE Symposium on the Foundations of Computer Science (FOCS), 1985, pp. 383-395
-
-
-
-
14
-
-
84957717648
-
Efficient multiparty computations secure against an adaptive adversary
-
Advances in Cryptology - Eurocrypt '99, Springer-Verlag
-
Cramer R., Damgård I., Dziembowski S., Hirt M., and Rabin T. Efficient multiparty computations secure against an adaptive adversary. Advances in Cryptology - Eurocrypt '99. Lecture Notes in Comput. Sci. vol. 1592 (1999), Springer-Verlag 311-326
-
(1999)
Lecture Notes in Comput. Sci.
, vol.1592
, pp. 311-326
-
-
Cramer, R.1
Damgård, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
15
-
-
33745124039
-
Constant-round multiparty computation using a black-box pseudorandom generator
-
Advances in Cryptology - Crypto 2005, Springer-Verlag
-
Damgård I., and Ishai Y. Constant-round multiparty computation using a black-box pseudorandom generator. Advances in Cryptology - Crypto 2005. Lecture Notes in Comput. Sci. vol. 3621 (2005), Springer-Verlag 378-394
-
(2005)
Lecture Notes in Comput. Sci.
, vol.3621
, pp. 378-394
-
-
Damgård, I.1
Ishai, Y.2
-
16
-
-
0001683636
-
Authenticated algorithms for Byzantine agreement
-
Dolev D., and Strong H. Authenticated algorithms for Byzantine agreement. SIAM J. Comput. 12 4 (1983) 656-666
-
(1983)
SIAM J. Comput.
, vol.12
, Issue.4
, pp. 656-666
-
-
Dolev, D.1
Strong, H.2
-
17
-
-
0025448931
-
Flipping persuasively in constant time
-
Dwork C., Shmoys D., and Stockmeyer L. Flipping persuasively in constant time. SIAM J. Comput. 19 3 (1990) 472-499
-
(1990)
SIAM J. Comput.
, vol.19
, Issue.3
, pp. 472-499
-
-
Dwork, C.1
Shmoys, D.2
Stockmeyer, L.3
-
18
-
-
58149161815
-
-
P. Feldman, Optimal algorithms for Byzantine agreement, PhD thesis, Massachusetts Institute of Technology, 1988
-
P. Feldman, Optimal algorithms for Byzantine agreement, PhD thesis, Massachusetts Institute of Technology, 1988
-
-
-
-
19
-
-
0022185625
-
-
P. Feldman, S. Micali, Byzantine agreement in constant expected time (and trusting no one), in: 26th Annual IEEE Symposium on the Foundations of Computer Science (FOCS), 1985, pp. 267-276
-
P. Feldman, S. Micali, Byzantine agreement in constant expected time (and trusting no one), in: 26th Annual IEEE Symposium on the Foundations of Computer Science (FOCS), 1985, pp. 267-276
-
-
-
-
20
-
-
0031210863
-
An optimal probabilistic protocol for synchronous Byzantine agreement
-
Feldman P., and Micali S. An optimal probabilistic protocol for synchronous Byzantine agreement. SIAM J. Comput. 26 4 (1997) 873-933
-
(1997)
SIAM J. Comput.
, vol.26
, Issue.4
, pp. 873-933
-
-
Feldman, P.1
Micali, S.2
-
21
-
-
0000613943
-
A lower bound for the time to assure interactive consistency
-
Fischer M.J., and Lynch N.A. A lower bound for the time to assure interactive consistency. Inform. Process. Lett. 14 4 (1982) 183-186
-
(1982)
Inform. Process. Lett.
, vol.14
, Issue.4
, pp. 183-186
-
-
Fischer, M.J.1
Lynch, N.A.2
-
22
-
-
1142293099
-
-
M. Fitzi, J. Garay, Efficient player-optimal protocols for strong and differential consensus, in: 22nd Annual ACM Symposium on Principles of Distributed Computing (PODC), 2003, pp. 211-220
-
M. Fitzi, J. Garay, Efficient player-optimal protocols for strong and differential consensus, in: 22nd Annual ACM Symposium on Principles of Distributed Computing (PODC), 2003, pp. 211-220
-
-
-
-
23
-
-
33745550878
-
Round-optimal and efficient verifiable secret sharing
-
3rd Theory of Cryptography Conference (TCC), Springer-Verlag
-
Fitzi M., Garay J., Gollakota S., Rangan C.P., and Srinathan K. Round-optimal and efficient verifiable secret sharing. 3rd Theory of Cryptography Conference (TCC). Lecture Notes in Comput. Sci. vol. 3876 (2006), Springer-Verlag 329-342
-
(2006)
Lecture Notes in Comput. Sci.
, vol.3876
, pp. 329-342
-
-
Fitzi, M.1
Garay, J.2
Gollakota, S.3
Rangan, C.P.4
Srinathan, K.5
-
24
-
-
0033702889
-
-
M. Fitzi, U. Maurer, From partial consistency to global broadcast, in: 32nd Annual ACM Symposium on Theory of Computing (STOC), 2000, pp. 494-503
-
M. Fitzi, U. Maurer, From partial consistency to global broadcast, in: 32nd Annual ACM Symposium on Theory of Computing (STOC), 2000, pp. 494-503
-
-
-
-
25
-
-
46749153857
-
-
J. Garay, J. Katz, C.-Y. Koo, R. Ostrovsky, Round complexity of authenticated broadcast with a dishonest majority, in: 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS), 2007, pp. 658-668
-
J. Garay, J. Katz, C.-Y. Koo, R. Ostrovsky, Round complexity of authenticated broadcast with a dishonest majority, in: 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS), 2007, pp. 658-668
-
-
-
-
26
-
-
0012525797
-
Fully polynomial Byzantine agreement for n > 3 t processors in t + 1 rounds
-
Garay J.A., and Moses Y. Fully polynomial Byzantine agreement for n > 3 t processors in t + 1 rounds. SIAM J. Comput. 27 1 (1998) 247-290
-
(1998)
SIAM J. Comput.
, vol.27
, Issue.1
, pp. 247-290
-
-
Garay, J.A.1
Moses, Y.2
-
27
-
-
0034830283
-
-
R. Gennaro, Y. Ishai, E. Kushilevitz, T. Rabin, The round complexity of verifiable secret sharing and secure multicast, in: 33rd Annual ACM Symposium on Theory of Computing (STOC), 2001, pp. 580-589
-
R. Gennaro, Y. Ishai, E. Kushilevitz, T. Rabin, The round complexity of verifiable secret sharing and secure multicast, in: 33rd Annual ACM Symposium on Theory of Computing (STOC), 2001, pp. 580-589
-
-
-
-
29
-
-
22344432877
-
Secure computation without agreement
-
Goldwasser S., and Lindell Y. Secure computation without agreement. J. Cryptology 18 3 (2005) 247-287
-
(2005)
J. Cryptology
, vol.18
, Issue.3
, pp. 247-287
-
-
Goldwasser, S.1
Lindell, Y.2
-
30
-
-
38749153587
-
-
S. Goldwasser, E. Pavlov, V. Vaikuntanathan, Fault-tolerant distributed computing in full-information networks, in: 47th Anuual IEEE Symposium on Foundations of Computer Science (FOCS), 2006, pp. 15-26
-
S. Goldwasser, E. Pavlov, V. Vaikuntanathan, Fault-tolerant distributed computing in full-information networks, in: 47th Anuual IEEE Symposium on Foundations of Computer Science (FOCS), 2006, pp. 15-26
-
-
-
-
31
-
-
32344443727
-
-
A. Hevia, D. Micciancio, Simultaneous broadcast revisited, in: 24th ACM Symposium on Principles of Distributed Computing (PODC), 2005, pp. 324-333
-
A. Hevia, D. Micciancio, Simultaneous broadcast revisited, in: 24th ACM Symposium on Principles of Distributed Computing (PODC), 2005, pp. 324-333
-
-
-
-
32
-
-
38049161810
-
Round-efficient secure computation in point-to-point networks
-
Advances in Cryptology - Eurocrypt 2007, Springer-Verlag
-
Katz J., and Koo C.-Y. Round-efficient secure computation in point-to-point networks. Advances in Cryptology - Eurocrypt 2007. Lecture Notes in Comput. Sci. vol. 4515 (2007), Springer-Verlag 311-328
-
(2007)
Lecture Notes in Comput. Sci.
, vol.4515
, pp. 311-328
-
-
Katz, J.1
Koo, C.-Y.2
-
33
-
-
49049095073
-
Improving the round complexity of VSS in point-to-point networks
-
35th International Colloquium on Automata, Languages and Programming (ICALP), Springer-Verlag
-
Katz J., Koo C.-Y., and Kumaresan R. Improving the round complexity of VSS in point-to-point networks. 35th International Colloquium on Automata, Languages and Programming (ICALP). Lecture Notes in Comput. Sci. vol. 5126 (2008), Springer-Verlag 499-510
-
(2008)
Lecture Notes in Comput. Sci.
, vol.5126
, pp. 499-510
-
-
Katz, J.1
Koo, C.-Y.2
Kumaresan, R.3
-
34
-
-
33748109704
-
-
E. Kushilevitz, Y. Lindell, T. Rabin, Information-theoretically secure protocols and security under composition, in: 38th Annual ACM Symposium on Theory of Computing (STOC), 2006, pp. 109-118
-
E. Kushilevitz, Y. Lindell, T. Rabin, Information-theoretically secure protocols and security under composition, in: 38th Annual ACM Symposium on Theory of Computing (STOC), 2006, pp. 109-118
-
-
-
-
36
-
-
0036038649
-
-
Y. Lindell, A. Lysyanskaya, T. Rabin, On the composition of authenticated Byzantine agreement, in: 34th Annual ACM Symposium on Theory of Computing (STOC), 2002, pp. 514-523
-
Y. Lindell, A. Lysyanskaya, T. Rabin, On the composition of authenticated Byzantine agreement, in: 34th Annual ACM Symposium on Theory of Computing (STOC), 2002, pp. 514-523
-
-
-
-
37
-
-
0036957660
-
-
Y. Lindell, A. Lysyanskaya, T. Rabin, Sequential composition of protocols without simultaneous termination, in: 21st Annual ACM Symposium on Principles of Distributed Computing (PODC), 2002, pp. 203-212
-
Y. Lindell, A. Lysyanskaya, T. Rabin, Sequential composition of protocols without simultaneous termination, in: 21st Annual ACM Symposium on Principles of Distributed Computing (PODC), 2002, pp. 203-212
-
-
-
-
38
-
-
84937429269
-
A threshold pseudorandom function construction and its applications
-
Advances in Cryptology - Crypto 2002, Springer-Verlag
-
Nielsen J.B. A threshold pseudorandom function construction and its applications. Advances in Cryptology - Crypto 2002. Lecture Notes in Comput. Sci. vol. 2442 (2002), Springer-Verlag 401-416
-
(2002)
Lecture Notes in Comput. Sci.
, vol.2442
, pp. 401-416
-
-
Nielsen, J.B.1
-
39
-
-
84976810569
-
Reaching agreement in the presence of faults
-
Pease M., Shostak R., and Lamport L. Reaching agreement in the presence of faults. J. ACM 27 2 (1980) 228-234
-
(1980)
J. ACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
40
-
-
58149175909
-
-
B. Pfitzmann, M. Waidner, Information-theoretic pseudosignatures and Byzantine agreement for t ≥ n / 3, Technical Report RZ 2882 (#90830), IBM Research, 1996
-
B. Pfitzmann, M. Waidner, Information-theoretic pseudosignatures and Byzantine agreement for t ≥ n / 3, Technical Report RZ 2882 (#90830), IBM Research, 1996
-
-
-
-
41
-
-
0020881178
-
-
M. Rabin, Randomized Byzantine generals, in: 24th Annual IEEE Symposium on Foundations of Computer Science (FOCS), 1983, pp. 403-409
-
M. Rabin, Randomized Byzantine generals, in: 24th Annual IEEE Symposium on Foundations of Computer Science (FOCS), 1983, pp. 403-409
-
-
-
-
42
-
-
0025152622
-
-
J. Rompel, One-way functions are necessary and sufficient for secure signatures, in: 22nd Annual ACM Symposium on Theory of Computing (STOC), 1990, pp. 387-394
-
J. Rompel, One-way functions are necessary and sufficient for secure signatures, in: 22nd Annual ACM Symposium on Theory of Computing (STOC), 1990, pp. 387-394
-
-
-
-
43
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Comm. ACM 22 11 (1979) 612-613
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
44
-
-
0021650338
-
-
S. Toueg, Randomized Byzantine agreements, in: 3rd Annual ACM Symposium on Principles of Distributed Computing (PODC), 1984, pp. 163-178
-
S. Toueg, Randomized Byzantine agreements, in: 3rd Annual ACM Symposium on Principles of Distributed Computing (PODC), 1984, pp. 163-178
-
-
-
-
45
-
-
0021372186
-
Extending binary Byzantine agreement to multivalued Byzantine agreement
-
available at
-
Turpin R., and Coan B. Extending binary Byzantine agreement to multivalued Byzantine agreement. Inform. Process. Lett. 18 2 (1984) 73-76. http://publications.csail.mit.edu/lcs/specpub.php?id=883 available at
-
(1984)
Inform. Process. Lett.
, vol.18
, Issue.2
, pp. 73-76
-
-
Turpin, R.1
Coan, B.2
-
46
-
-
58149158018
-
-
M. Waidner, Byzantinische Verteilung ohne Kryptographische Annahmen trotz Beliebig Vieler Fehler, PhD thesis, University of Karlsruhe, 1991 (in German)
-
M. Waidner, Byzantinische Verteilung ohne Kryptographische Annahmen trotz Beliebig Vieler Fehler, PhD thesis, University of Karlsruhe, 1991 (in German)
-
-
-
|