-
1
-
-
84937431456
-
Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Algesheimer, J., Camenisch, J., Shoup, V.: Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 417-432. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 417-432
-
-
Algesheimer, J.1
Camenisch, J.2
Shoup, V.3
-
2
-
-
38049082907
-
-
Aumann, Y., Lindell, Y.: Security against covert adversaries: Efficient protocols for realistic adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 137-156. Springer, Heidelberg (2007)
-
Aumann, Y., Lindell, Y.: Security against covert adversaries: Efficient protocols for realistic adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137-156. Springer, Heidelberg (2007)
-
-
-
-
3
-
-
0043140707
-
Optimal amortized distributed consensus
-
Bar-Noy, A., Deng, X., Garay, J.A., Kameda, T.: Optimal amortized distributed consensus. Information and Computation 120(1), 93-100 (1995)
-
(1995)
Information and Computation
, vol.120
, Issue.1
, pp. 93-100
-
-
Bar-Noy, A.1
Deng, X.2
Garay, J.A.3
Kameda, T.4
-
4
-
-
17744381610
-
Universally composable protocols with relaxed set-up assumptions. In: FOCS
-
Los Alamitos
-
Barak, B., Canetti, R., Nielsen, J.B., Pass, R.: Universally composable protocols with relaxed set-up assumptions. In: FOCS, pp. 186-195. IEEE Computer Society, Los Alamitos (2004)
-
(2004)
IEEE Computer Society
, pp. 186-195
-
-
Barak, B.1
Canetti, R.2
Nielsen, J.B.3
Pass, R.4
-
5
-
-
40349089019
-
-
Beerliová-Trubi8́niová, Z., Hirt, M.: Perfectly-secure MPC with linear communication complexity. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 213-230. Springer, Heidelberg (2008)
-
Beerliová-Trubi8́niová, Z., Hirt, M.: Perfectly-secure MPC with linear communication complexity. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 213-230. Springer, Heidelberg (2008)
-
-
-
-
6
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract)
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In: STOC, pp. 1-10 (1988)
-
(1988)
STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
7
-
-
33748117259
-
-
Berman, P., Garay, J.A., Perry, K.J.: Optimal early stopping in distributed consensus. In: Segall, A., Zaks, S. (eds.) WDAG 1992. LNCS, 647, pp. 221-237. Springer, Heidelberg (1992)
-
Berman, P., Garay, J.A., Perry, K.J.: Optimal early stopping in distributed consensus. In: Segall, A., Zaks, S. (eds.) WDAG 1992. LNCS, vol. 647, pp. 221-237. Springer, Heidelberg (1992)
-
-
-
-
8
-
-
70350379222
-
-
Bogetoft, P., Christensen, D.L., Damgård, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M.I., Toft, T.: Secure multiparty computation goes live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, 5628, pp. 325-343. Springer, Heidelberg (2009)
-
Bogetoft, P., Christensen, D.L., Damgård, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M.I., Toft, T.: Secure multiparty computation goes live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 325-343. Springer, Heidelberg (2009)
-
-
-
-
9
-
-
0035163054
-
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136-145. IEEE, Los Alamitos (2001)
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136-145. IEEE, Los Alamitos (2001)
-
-
-
-
10
-
-
38049152492
-
Scalable and unconditionally secure multiparty computation
-
Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
-
Damgård, I., Nielsen, J.B.: Scalable and unconditionally secure multiparty computation. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 572-590. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 572-590
-
-
Damgård, I.1
Nielsen, J.B.2
-
11
-
-
84937437506
-
Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Damgård, I.B., Nielsen, J.B.: Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 581-596. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 581-596
-
-
Damgård, I.B.1
Nielsen, J.B.2
-
12
-
-
51849125042
-
Scalable multiparty computation with nearly optimal work and resilience
-
Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
-
Damgård, I., Ishai, Y., Krøigaard, M., Nielsen, J.B., Smith, A.: Scalable multiparty computation with nearly optimal work and resilience. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 241-261. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 241-261
-
-
Damgård, I.1
Ishai, Y.2
Krøigaard, M.3
Nielsen, J.B.4
Smith, A.5
-
13
-
-
77949577082
-
From passive to covert security at low cost. Cryptology ePrint Archive
-
Report 2009/592
-
Damgård, I., Geisler, M., Nielsen, J.B.: From passive to covert security at low cost. Cryptology ePrint Archive, Report 2009/592 (2009), http://eprint.iacr.org/
-
(2009)
-
-
Damgård, I.1
Geisler, M.2
Nielsen, J.B.3
-
14
-
-
0023545076
-
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229. ACM, New York (1987)
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229. ACM, New York (1987)
-
-
-
-
15
-
-
44449160882
-
Efficient two party and multi party computation against covert adversaries
-
Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
-
Goyal, V., Mohassel, P., Smith, A.: Efficient two party and multi party computation against covert adversaries. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 289-306. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 289-306
-
-
Goyal, V.1
Mohassel, P.2
Smith, A.3
-
16
-
-
0036957660
-
Sequential composition of protocols without simultaneous termination
-
ACM Press, New York
-
Lindell, Y., Lysyanskaya, A., Rabin, T.: Sequential composition of protocols without simultaneous termination. In: Proceedings of the twenty-first annual symposium on Principles of distributed computing, pp. 203-212. ACM Press, New York (2002)
-
(2002)
Proceedings of the twenty-first annual symposium on Principles of distributed computing
, pp. 203-212
-
-
Lindell, Y.1
Lysyanskaya, A.2
Rabin, T.3
|