-
1
-
-
33745570603
-
Efficient multi-party computation with dispute control
-
Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
-
Beerliová-Trubíniová, Z., Hirt, M.: Efficient multi-party computation with dispute control. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 305-328. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3876
, pp. 305-328
-
-
Beerliová-Trubíniová, Z.1
Hirt, M.2
-
2
-
-
38349009076
-
Simple and efficient perfectly-secure asynchronous MPC
-
Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
-
Beerliová-Trubíniová, Z., Hirt, M.: Simple and efficient perfectly-secure asynchronous MPC. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 376-392. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 376-392
-
-
Beerliová-Trubíniová, Z.1
Hirt, M.2
-
3
-
-
40349089019
-
Perfectly-secure MPC with linear communication complexity
-
Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
-
Beerliová-Trubíniová, Z., Hirt, M.: Perfectly-secure MPC with linear communication complexity. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 213-230. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 213-230
-
-
Beerliová-Trubíniová, Z.1
Hirt, M.2
-
4
-
-
0027188428
-
Asynchronous secure computation
-
Ben-Or, M., Canetti, R., Goldreich, O.: Asynchronous secure computation. In: STOC, pp. 52-61 (1993)
-
(1993)
STOC
, pp. 52-61
-
-
Ben-Or, M.1
Canetti, R.2
Goldreich, O.3
-
5
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computation
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation. In: STOC, pp. 1-10 (1988)
-
(1988)
STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
85008184918
-
Asynchronous secure computations with optimal resilience
-
BenOr, M., Kelmer, B., Rabin, T.: Asynchronous secure computations with optimal resilience. In: PODC, pp. 183-192 (1994)
-
(1994)
PODC
, pp. 183-192
-
-
BenOr, M.1
Kelmer, B.2
Rabin, T.3
-
7
-
-
0011797655
-
An asynchronous ⌊(n - 1)/3⌋-resilient consensus protocol
-
Bracha, G.: An asynchronous ⌊(n - 1)/3⌋-resilient consensus protocol. In: PODC, pp. 154-162 (1984)
-
(1984)
PODC
, pp. 154-162
-
-
Bracha, G.1
-
9
-
-
0027313816
-
Fast asynchronous Byzantine Agreement with optimal resilience
-
Canetti, R., Rabin, T.: Fast asynchronous Byzantine Agreement with optimal resilience. In: STOC, pp. 42-51 (1993)
-
(1993)
STOC
, pp. 42-51
-
-
Canetti, R.1
Rabin, T.2
-
10
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
extended abstract
-
Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols (extended abstract). In: STOC, pp. 11-19 (1988)
-
(1988)
STOC
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
11
-
-
38049152492
-
Scalable and unconditionally secure multiparty computation
-
Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
-
Damgård, I., Nielsen, J.B.: Scalable and unconditionally secure multiparty computation. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 572-590. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 572-590
-
-
Damgård, I.1
Nielsen, J.B.2
-
12
-
-
0026985378
-
Communication complexity of secure computation
-
Franklin, M.K., Yung, M.: Communication complexity of secure computation. In: STOC, pp. 699-710 (1992)
-
(1992)
STOC
, pp. 699-710
-
-
Franklin, M.K.1
Yung, M.2
-
13
-
-
77953495230
-
An optimal algorithm for synchronous Byzantine Agreemet
-
Feldman, P., Micali, S.: An optimal algorithm for synchronous Byzantine Agreemet. In: STOC, pp. 639-648 (1988)
-
(1988)
STOC
, pp. 639-648
-
-
Feldman, P.1
Micali, S.2
-
14
-
-
33745550878
-
Round-optimal and efficient verifiable secret sharing
-
Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
-
Fitzi, M., Garay, J., Gollakota, S., Pandu Rangan, C., Srinathan, K.: Round-optimal and efficient verifiable secret sharing. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 329-342. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3876
, pp. 329-342
-
-
Fitzi, M.1
Garay, J.2
Gollakota, S.3
Pandu Rangan, C.4
Srinathan, K.5
-
15
-
-
0034830283
-
The round complexity of verifiable secret sharing and secure multicast
-
Gennaro, R., Ishai, Y., Kushilevitz, E., Rabin, T.: The round complexity of verifiable secret sharing and secure multicast. In: STOC, pp. 580-589 (2001)
-
(2001)
STOC
, pp. 580-589
-
-
Gennaro, R.1
Ishai, Y.2
Kushilevitz, E.3
Rabin, T.4
-
16
-
-
49049095073
-
Improving the round complexity of VSS in point-to-point networks
-
Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
-
Katz, J., Koo, C., Kumaresan, R.: Improving the round complexity of VSS in point-to-point networks. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 499-510. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5126
, pp. 499-510
-
-
Katz, J.1
Koo, C.2
Kumaresan, R.3
-
17
-
-
70350348919
-
The round complexity of verifiable secret sharing revisited
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Patra, A., Choudhary, A., Rabin, T., Pandu Rangan, C.: The round complexity of verifiable secret sharing revisited. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 487-504. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 487-504
-
-
Patra, A.1
Choudhary, A.2
Rabin, T.3
Pandu Rangan, C.4
-
18
-
-
77953509542
-
Efficient asynchronous multiparty computation with optimal resilience
-
Report 2008/425
-
Patra, A., Choudhary, A., Pandu Rangan, C.: Efficient asynchronous multiparty computation with optimal resilience. Cryptology ePrint Archive, Report 2008/425 (2008)
-
(2008)
Cryptology ePrint Archive
-
-
Patra, A.1
Choudhary, A.2
Pandu Rangan, C.3
-
19
-
-
70350627331
-
Efficient asynchronous Byzantine Agreement with optimal resilience
-
Patra, A., Choudhary, A., Pandu Rangan, C.: Efficient asynchronous Byzantine Agreement with optimal resilience. In: PODC, pp. 92-101 (2009)
-
(2009)
PODC
, pp. 92-101
-
-
Patra, A.1
Choudhary, A.2
Pandu Rangan, C.3
-
20
-
-
77953492782
-
Unconditionally secure asynchronous multiparty computation with quadratic communication per multiplication gate
-
Report 2009/087
-
Patra, A., Choudhary, A., Pandu Rangan, C.: Unconditionally secure asynchronous multiparty computation with quadratic communication per multiplication gate. Cryptology ePrint Archive, Report 2009/087 (2009)
-
(2009)
Cryptology ePrint Archive
-
-
Patra, A.1
Choudhary, A.2
Pandu Rangan, C.3
-
22
-
-
35248867326
-
Trading players for efficiency in unconditional multiparty computation
-
Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. Springer, Heidelberg
-
Prabhu, B., Srinathan, K., Pandu Rangan, C.: Trading players for efficiency in unconditional multiparty computation. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 342-353. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2576
, pp. 342-353
-
-
Prabhu, B.1
Srinathan, K.2
Pandu Rangan, C.3
-
23
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: STOC, pp. 73-85 (1989)
-
(1989)
STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
24
-
-
84947784853
-
Efficient asynchronous secure multiparty distributed computation
-
Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. Springer, Heidelberg
-
Srinathan, K., Pandu Rangan, C.: Efficient asynchronous secure multiparty distributed computation. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 117-129. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1977
, pp. 117-129
-
-
Srinathan, K.1
Pandu Rangan, C.2
-
25
-
-
0020312165
-
Protocols for secure computations
-
Yao, A.C.: Protocols for secure computations. In: FOCS, pp. 160-164 (1982)
-
(1982)
FOCS
, pp. 160-164
-
-
Yao, A.C.1
|