-
1
-
-
84933507780
-
Efficient multiparty protocols using circuit randomization
-
Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
-
Beaver, D.: Efficient multiparty protocols using circuit randomization. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 420-432. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 420-432
-
-
Beaver, D.1
-
2
-
-
33746365751
-
Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
-
Beaver, D.: Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology 4(4), 75-122 (1991)
-
(1991)
Journal of Cryptology
, vol.4
, Issue.4
, pp. 75-122
-
-
Beaver, D.1
-
3
-
-
33745570603
-
Efficient multi-party computation with dispute control
-
Beerliová-Trubíniová, Z., Hirt, M.: Efficient multi-party computation with dispute control. In: Proc. of TCC, pp. 305-328 (2006)
-
(2006)
Proc. of TCC
, pp. 305-328
-
-
Beerliová-Trubíniová, Z.1
Hirt, M.2
-
4
-
-
40349089019
-
-
Beerliová-Trubíniová, Z., Hirt, M.: Perfectly-secure MPC with linear communication complexity. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 213-230. Springer, Heidelberg (2008)
-
Beerliová-Trubíniová, Z., Hirt, M.: Perfectly-secure MPC with linear communication complexity. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 213-230. Springer, Heidelberg (2008)
-
-
-
-
5
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computation
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation. In: STOC, pp. 1-10 (1988)
-
(1988)
STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
0003661492
-
-
Computer Science Research
-
Berman, P., Garay, J.A., Perry, K.J.: Bit optimal distributed consensus. Computer Science Research, 313-322 (1992)
-
(1992)
Bit optimal distributed consensus
, pp. 313-322
-
-
Berman, P.1
Garay, J.A.2
Perry, K.J.3
-
8
-
-
84898947315
-
Multiparty unconditionally secure protocols (extended abstract)
-
Chaum, D., Crpeau, C., Damgård, I.: Multiparty unconditionally secure protocols (extended abstract). In: Proc. of FOCS 1988, pp. 11-19 (1988)
-
(1988)
Proc. of FOCS 1988
, pp. 11-19
-
-
Chaum, D.1
Crpeau, C.2
Damgård, I.3
-
10
-
-
84957717648
-
Efficient multiparty computations secure against an adaptive adversary
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Cramer, R., Damgård, I., Dziembowski, S., Hirt, M., Rabin, T.: Efficient multiparty computations secure against an adaptive adversary. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 311-326. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 311-326
-
-
Cramer, R.1
Damgård, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
11
-
-
38049152492
-
Scalable and unconditionally secure multiparty computation
-
Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
-
Damgård, I., Nielsen, J.B.: Scalable and unconditionally secure multiparty computation. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 572-590. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 572-590
-
-
Damgård, I.1
Nielsen, J.B.2
-
12
-
-
33748676639
-
-
Fitzi, M., Hirt, M.: Optimally Efficient Multi-Valued Byzantine Agreement. In: Proc. of PODC 2006, pp. 163-168. ACM, New York (2006)
-
Fitzi, M., Hirt, M.: Optimally Efficient Multi-Valued Byzantine Agreement. In: Proc. of PODC 2006, pp. 163-168. ACM, New York (2006)
-
-
-
-
13
-
-
58549101194
-
Round Efficient Unconditionally Seecure Multiparty Computation. Cryptology ePrint Archive
-
Report 2008/399
-
Patra, A., Choudhary, A., Pandu Rangan, C.: Round Efficient Unconditionally Seecure Multiparty Computation. Cryptology ePrint Archive, Report 2008/399
-
-
-
Patra, A.1
Choudhary, A.2
Pandu Rangan, C.3
-
14
-
-
0003445668
-
Information-theoretic pseudosignatures and byzantine agreement for t ≥ n/3
-
Technical report, IBM Research
-
Pfitzmann, B., Waidner, M.: Information-theoretic pseudosignatures and byzantine agreement for t ≥ n/3. Technical report, IBM Research (1996)
-
(1996)
-
-
Pfitzmann, B.1
Waidner, M.2
-
15
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority (extended abstract)
-
Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority (extended abstract). In: STOC, pp. 73-85 (1989)
-
(1989)
STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
16
-
-
0020312165
-
Protocols for secure computations
-
Yao, A.C.: Protocols for secure computations. In: Proc. of 23rd IEEE FOCS, pp. 160-164 (1982)
-
(1982)
Proc. of 23rd IEEE FOCS
, pp. 160-164
-
-
Yao, A.C.1
|