-
1
-
-
84898960610
-
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In: STOC, pp. 1-10 (1988)
-
(1988)
STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
2
-
-
84898947315
-
Multiparty Unconditionally Secure Protocols
-
Chaum, D., Crpeau, C., Damgåard, I.: Multiparty Unconditionally Secure Protocols. In: FOCS, pp. 11-19 (1988)
-
(1988)
FOCS
, pp. 11-19
-
-
Chaum, D.1
Crpeau, C.2
Damgåard, I.3
-
3
-
-
0022199386
-
Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults
-
Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults. In: STOC, pp. 383-395 (1985)
-
(1985)
STOC
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
4
-
-
0033706246
-
On the Complexity of Verifiable Secret Sharing and Multiparty Computation
-
Cramer, R., Damgård, I., Dziembowski, S.: On the Complexity of Verifiable Secret Sharing and Multiparty Computation. In: STOC, pp. 325-334 (2000)
-
(2000)
STOC
, pp. 325-334
-
-
Cramer, R.1
Damgård, I.2
Dziembowski, S.3
-
5
-
-
84957717648
-
Efficient Multiparty Computations Secure Against an Adaptive Adversary
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Cramer, R., Damgård, I., Dziembowski, S., Hirt, M., Rabin, T.: Efficient Multiparty Computations Secure Against an Adaptive Adversary. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 311-326. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 311-326
-
-
Cramer, R.1
Damgård, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
6
-
-
84948975649
-
General Secure Multi-Party Computation from Any Linear Secret-Sharing Scheme
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Cramer, R., Damgård, I., Maurer, U.M.: General Secure Multi-Party Computation from Any Linear Secret-Sharing Scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 316-334. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 316-334
-
-
Cramer, R.1
Damgård, I.2
Maurer, U.M.3
-
7
-
-
0027341860
-
Perfectly Secure Message Transmission
-
Dolev, D., Dwork, C., Waarts, O., Yung, M.: Perfectly Secure Message Transmission. JACM 40(1), 17-47 (1993)
-
(1993)
JACM
, vol.40
, Issue.1
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
8
-
-
70350293006
-
-
Dwork, C.: Strong Verifiable Secret Sharing. In: van Leeuwen, J., Santoro, N. (eds.) WDAG 1990. LNCS, 486, pp. 213-227. Springer, Heidelberg (1990)
-
Dwork, C.: Strong Verifiable Secret Sharing. In: van Leeuwen, J., Santoro, N. (eds.) WDAG 1990. LNCS, vol. 486, pp. 213-227. Springer, Heidelberg (1990)
-
-
-
-
9
-
-
0023538330
-
A Practical Scheme for Non-Interactive Verifiable Secret Sharing
-
Feldman, P.: A Practical Scheme for Non-Interactive Verifiable Secret Sharing. In: FOCS, pp. 427-437 (1987)
-
(1987)
FOCS
, pp. 427-437
-
-
Feldman, P.1
-
10
-
-
33745550878
-
-
Fitzi, M., Garay, J., Gollakota, S., Pandu Rangan, C., Srinathan, K.: Round-Optimal and Efficient Verifiable Secret Sharing. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 329-342. Springer, Heidelberg (2006)
-
Fitzi, M., Garay, J., Gollakota, S., Pandu Rangan, C., Srinathan, K.: Round-Optimal and Efficient Verifiable Secret Sharing. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 329-342. Springer, Heidelberg (2006)
-
-
-
-
11
-
-
0034830283
-
The Round Complexity of Verifiable Secret Sharing and Secure Multicast
-
Gennaro, R., Ishai, Y., Kushilevitz, E., Rabin, T.: The Round Complexity of Verifiable Secret Sharing and Secure Multicast. In: STOC, pp. 580-589 (2001)
-
(2001)
STOC
, pp. 580-589
-
-
Gennaro, R.1
Ishai, Y.2
Kushilevitz, E.3
Rabin, T.4
-
12
-
-
0023545076
-
How to Play a Mental Game- a Completeness Theorem for Protocols with Honest Majority
-
Golderich, O., Micali, S., Wigderson, A.: How to Play a Mental Game- a Completeness Theorem for Protocols with Honest Majority. In: STOC 1987, pp. 218-229 (1987)
-
(1987)
STOC 1987
, pp. 218-229
-
-
Golderich, O.1
Micali, S.2
Wigderson, A.3
-
14
-
-
49049095073
-
-
J. Katz, C. Koo, and R. Kumaresan. Improving the Round Complexity of VSS in Point-to-Point Networks. Cryptology ePrint 2007/358; In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, 5126, pp. 499-510. Springer, Heidelberg (2008)
-
J. Katz, C. Koo, and R. Kumaresan. Improving the Round Complexity of VSS in Point-to-Point Networks. Cryptology ePrint 2007/358; In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 499-510. Springer, Heidelberg (2008)
-
-
-
-
15
-
-
70350276840
-
-
Patra, A., Choudhary, A., Rabin, T., Pandu Rangan, C.: The Round Complexity of Verifiable Secret Sharing Revisited. Cryptology ePrint 2008/172
-
Patra, A., Choudhary, A., Rabin, T., Pandu Rangan, C.: The Round Complexity of Verifiable Secret Sharing Revisited. Cryptology ePrint 2008/172
-
-
-
-
16
-
-
84982943258
-
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
-
Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
-
Pedersen, T.P.: Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129-140. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
17
-
-
0028542745
-
Robust Sharing of Secrets When the Dealer is Honest or Cheating
-
Rabin, T.: Robust Sharing of Secrets When the Dealer is Honest or Cheating. J. ACM 41(6), 1089-1109 (1994)
-
(1994)
J. ACM
, vol.41
, Issue.6
, pp. 1089-1109
-
-
Rabin, T.1
-
18
-
-
0024859552
-
Verifiable Secret Sharing and Multiparty Protocols with Honest Majority
-
Rabin, T., Ben-Or, M.: Verifiable Secret Sharing and Multiparty Protocols with Honest Majority. In: STOC, pp. 73-85 (1989)
-
(1989)
STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
19
-
-
0018545449
-
How to Share a Secret
-
Shamir, A.: How to Share a Secret. Comm. of the ACM 22(11), 612-613 (1979)
-
(1979)
Comm. of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
20
-
-
85008350180
-
How to Share a Secret with Cheaters
-
Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
-
Tompa, M., Woll, H.: How to Share a Secret with Cheaters. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 261-265. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.263
, pp. 261-265
-
-
Tompa, M.1
Woll, H.2
|