-
1
-
-
67049153665
-
-
Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, May 2-4, 1988, Chicago, Illinois, USA. ACM (1988)
-
Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, May 2-4, 1988, Chicago, Illinois, USA. ACM (1988)
-
-
-
-
2
-
-
40349089019
-
-
Beerliova-Trubmiova, Z., Hirt, M.: Perfectly-secure MPC with linear communication complexity. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 213-230. Springer, Heidelberg (2008)
-
Beerliova-Trubmiova, Z., Hirt, M.: Perfectly-secure MPC with linear communication complexity. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 213-230. Springer, Heidelberg (2008)
-
-
-
-
4
-
-
84898960610
-
Completeness theorems for non- cryptographic fault-tolerant distributed computation
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non- cryptographic fault-tolerant distributed computation. In: STOC [1], pp. 1-10
-
STOC
, vol.1
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
67049091542
-
-
Bogetoft, P., Christensen, D.L., Damgard, I., Geisler, M., Jakobsen, T., Kr0igaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Multiparty computation goes live. Cryptology ePrint Archive, Report 2008/068 (2008), http://eprint.iacr.org/
-
Bogetoft, P., Christensen, D.L., Damgard, I., Geisler, M., Jakobsen, T., Kr0igaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Multiparty computation goes live. Cryptology ePrint Archive, Report 2008/068 (2008), http://eprint.iacr.org/
-
-
-
-
6
-
-
0035163054
-
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136-145. IEEE, Los Alamitos (2001)
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136-145. IEEE, Los Alamitos (2001)
-
-
-
-
7
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
Chaum, D., Crepeau, C., Damgard, I.: Multiparty unconditionally secure protocols. In: STOC [1], pp. 11-19 (1988)
-
(1988)
STOC
, vol.1
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
8
-
-
21144458613
-
-
Cramer, R., Damgard, I.B., Ishai, Y.: Share conversion, pseudorandom secret- sharing and applications to secure computation. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 342-362. Springer, Heidelberg (2005)
-
Cramer, R., Damgard, I.B., Ishai, Y.: Share conversion, pseudorandom secret- sharing and applications to secure computation. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 342-362. Springer, Heidelberg (2005)
-
-
-
-
9
-
-
21144458613
-
-
Cramer, R., Damgard, I.B., Ishai, Y.: Share conversion, pseudorandom secret- sharing and applications to secure computation. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 342-362. Springer, Heidelberg (2005)
-
Cramer, R., Damgard, I.B., Ishai, Y.: Share conversion, pseudorandom secret- sharing and applications to secure computation. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 342-362. Springer, Heidelberg (2005)
-
-
-
-
10
-
-
0023545076
-
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229. ACM, New York (1987)
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229. ACM, New York (1987)
-
-
-
-
11
-
-
84880854377
-
Robustness for free in unconditional multi-party computation
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Hirt, M., Maurer, U.M.: Robustness for free in unconditional multi-party computation. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 101-118. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 101-118
-
-
Hirt, M.1
Maurer, U.M.2
-
12
-
-
49049092824
-
Asynchronous multi-party computation with quadratic communication
-
Aceto, L, Damgard, I, Goldberg, L.A, Halldorsson, M.M, Ingolfsdottir, A, Walukiewicz, I, eds, ICALP 2008, Part II, Springer, Heidelberg
-
Hirt, M., Nielsen, J.B., Przydatek, B.: Asynchronous multi-party computation with quadratic communication. In: Aceto, L., Damgard, I., Goldberg, L.A., Halldorsson, M.M., Ingolfsdottir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 473-485. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5126
, pp. 473-485
-
-
Hirt, M.1
Nielsen, J.B.2
Przydatek, B.3
-
13
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
14
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612-613 1979)
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|