-
2
-
-
0035163053
-
Resettably-sound zero-knowledge and its applications
-
[BGGL01] Barak, B., Goldreich, O., Goldwasser, S., Lindell, Y.: Resettably-sound zero-knowledge and its applications. In: FOCS, pp. 116-125 (2001) (Pubitemid 33068372)
-
(2001)
Annual Symposium on Foundations of Computer Science - Proceedings
, pp. 116-125
-
-
Barak, B.1
Goldreich, O.2
Goldwasser, S.3
Lindell, Y.4
-
3
-
-
0025137207
-
The round complexity of secure protocols (extended abstract)
-
[BMR90], ACM, New York
-
[BMR90] Beaver, D., Micali, S., Rogaway, P.: The round complexity of secure protocols (extended abstract). In: STOC, pp. 503-513. ACM, New York (1990)
-
(1990)
STOC
, pp. 503-513
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
5
-
-
84880897758
-
Universally Composable Commitments
-
Advances in Cryptology - CRYPTO 2001
-
[CF01] Canetti, R., Fischlin, M.: Universally composable commitments. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 19-40. Springer, Heidelberg (2001) (Pubitemid 33317906)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2139
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
6
-
-
0033723965
-
Resettable zeroknowledge (extended abstract)
-
[CGGM00]
-
[CGGM00] Canetti, R., Goldreich, O., Goldwasser, S., Micali, S.: Resettable zeroknowledge (extended abstract). In: STOC, pp. 235-244 (2000)
-
(2000)
STOC
, pp. 235-244
-
-
Canetti, R.1
Goldreich, O.2
Goldwasser, S.3
Micali, S.4
-
7
-
-
44449151536
-
New constructions for UC secure computation using tamper-proof hardware
-
DOI 10.1007/978-3-540-78967-3-31, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
[CGS08] Chandran, N., Goyal, V., Sahai, A.: New constructions for UC secure computation using tamper-proof hardware. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 545-562. Springer, Heidelberg (2008) (Pubitemid 351762849)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965
, pp. 545-562
-
-
Chandran, N.1
Goyal, V.2
Sahai, A.3
-
8
-
-
32844458303
-
On the limitations of universally composable two-party computation without set-up assumptions
-
DOI 10.1007/s00145-005-0419-9
-
[CKL06] Canetti, R., Kushilevitz, E., Lindell, Y.: On the limitations of universally composable two-party computation without set-up assumptions. J. Cryptology 19(2), 135-167 (2006) (Pubitemid 43255771)
-
(2006)
Journal of Cryptology
, vol.19
, Issue.2
, pp. 135-167
-
-
Canetti, R.1
Kushilevitz, E.2
Lindell, Y.3
-
9
-
-
38049110283
-
Instance-depenDent verifiable random functions and their application to simultaneous resettability
-
[DL07], In: Naor, M. (ed.), LNCS, Springer, Heidelberg
-
[DL07] Deng, Y., Lin, D.: Instance-depenDent verifiable random functions and their application to simultaneous resettability. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 148-168. Springer, Heidelberg (2007)
-
(2007)
EUROCRYPT 2007
, vol.4515
, pp. 148-168
-
-
Deng, Y.1
Lin, D.2
-
11
-
-
0031632567
-
Concurrent zero-knowledge
-
[DNS98]
-
[DNS98] Dwork, C., Naor, M., Sahai, A.: Concurrent zero-knowledge. In: STOC, pp. 409-418 (1998)
-
(1998)
STOC
, pp. 409-418
-
-
Dwork, C.1
Naor, M.2
Sahai, A.3
-
12
-
-
70349305273
-
Differential privacy: A survey of results
-
[Dwo08], In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.), LNCS, Springer, Heidelberg
-
[Dwo08] Dwork, C.: Differential privacy: A survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1-19. Springer, Heidelberg (2008)
-
(2008)
TAMC 2008
, vol.4978
, pp. 1-19
-
-
Dwork, C.1
-
13
-
-
0023545076
-
How to play any mental game
-
[GMW87], ACM Press, New York
-
[GMW87] Goldreich, O., Micali, S.,Wigderson, A.: How to play any mental game. In: STOC 1987: Proceedings of the 19th annual ACM conference on Theory of computing, pp. 218-229. ACM Press, New York (1987)
-
(1987)
STOC 1987: Proceedings of the 19th annual ACM conference on Theory of computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
14
-
-
67650687893
-
Resolving the simultaneous resettability conjecture and a new non-black-box simulation strategy
-
[GS08]
-
[GS08] Goyal, V., Sahai, A.: Resolving the simultaneous resettability conjecture and a new non-black-box simulation strategy. Cryptology ePrint Archive, Report 2008/545 (2008), http://eprint.iacr.org/
-
(2008)
Cryptology ePrint Archive, Report 2008/545
-
-
Goyal, V.1
Sahai, A.2
-
15
-
-
38049150653
-
Universally composable multi-party computation using tamperproof hardware
-
[Kat07], In: Naor, M. (ed.), LNCS, Springer, Heidelberg
-
Katz, J.: Universally composable multi-party computation using tamperproof hardware. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 115-128. Springer, Heidelberg (2007)
-
(2007)
EUROCRYPT 2007
, vol.4515
, pp. 115-128
-
-
Katz, J.1
-
16
-
-
0034830278
-
Concurrent and resettable zero-knowledge in polyloalgorithm rounds
-
[KP01]
-
[KP01] Kilian, J., Petrank, E.: Concurrent and resettable zero-knowledge in polyloalgorithm rounds. In: STOC, pp. 560-569 (2001)
-
(2001)
STOC
, pp. 560-569
-
-
Kilian, J.1
Petrank, E.2
-
17
-
-
0038446804
-
Bounded-concurrent secure two-party computation without setup assumptions
-
[Lin03], ACM Press, New York
-
[Lin03] Lindell, Y.: Bounded-concurrent secure two-party computation without setup assumptions. In: STOC, pp. 683-692. ACM Press, New York (20
-
(2003)
STOC
, pp. 683-692
-
-
Lindell, Y.1
-
18
-
-
35048903637
-
Lower bounds for concurrent self composition
-
[Lin04], In: Naor, M. (ed.), LNCS, Springer, Heidelberg
-
[Lin04] Lindell, Y.: Lower bounds for concurrent self composition. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 203-222. Springer, Heidelberg (2004)
-
(2004)
TCC 2004
, vol.2951
, pp. 203-222
-
-
Lindell, Y.1
-
19
-
-
33748094243
-
Local zero knowledge
-
STOC'06: Proceedings of the 38th Annual ACM Symposium on Theory of Computing
-
[MP06] Micali, S., Pass, R.: Local zero knowledge. In: Kleinberg, J.M. (ed.) STOC, pp. 306-315. ACM, New York (2006) (Pubitemid 44306564)
-
(2006)
Proceedings of the Annual ACM Symposium on Theory of Computing
, vol.2006
, pp. 306-315
-
-
Micali, S.1
Pass, R.2
-
20
-
-
0036957024
-
Concurrent zero knowledge with logarithmic round-complexity
-
[PRS02]
-
[PRS02] Prabhakaran, M., Rosen, A., Sahai, A.: Concurrent zero knowledge with logarithmic round-complexity. In: FOCS, pp. 366-375 (2002
-
(2002)
FOCS
, pp. 366-375
-
-
Prabhakaran, M.1
Rosen, A.2
Sahai, A.3
-
22
-
-
0018545449
-
How to share a secret
-
[Sha79]
-
[Sha79] Shamir, A.: How to share a secret. Commun. ACM 22(11), 612-613 (1979)
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
23
-
-
0022882770
-
How to generate and exchange secrets (extended abstract)
-
[Yao86] , IEEE, Los Alamitos
-
[Yao86] Yao, A.C.-C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162-167. IEEE, Los Alamitos (1986)
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.C.-C.1
-
24
-
-
38049186670
-
Generic and practical resettable zero-knowledge in the bare public-key model
-
[YZ07], In: Naor, M. (ed.), LNCS, Springer, Heidelberg
-
[YZ07] Yung, M., Zhao, Y.: Generic and practical resettable zero-knowledge in the bare public-key model. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 129-147. Springer, Heidelberg (2007)
-
(2007)
EUROCRYPT 2007
, vol.4515
, pp. 129-147
-
-
Yung, M.1
Zhao, Y.2
|