-
1
-
-
0027188428
-
Asynchronous secure computation
-
Ben-Or, M., Canetti, R., Goldreich, O.: Asynchronous secure computation. In: STOC 1993, pp. 52-61 (1993)
-
(1993)
STOC 1993
, pp. 52-61
-
-
Ben-Or, M.1
Canetti, R.2
Goldreich, O.3
-
2
-
-
38249015281
-
Shifting gears: Changing algorithms on the fly to expedite Byzantine agreement
-
Bar-Noy, A., Dolev, D., Dwork, C., Strong, H.R.: Shifting gears: Changing algorithms on the fly to expedite Byzantine agreement. Information and Computation 97(2), 205-233 (1992)
-
(1992)
Information and Computation
, vol.97
, Issue.2
, pp. 205-233
-
-
Bar-Noy, A.1
Dolev, D.2
Dwork, C.3
Strong, H.R.4
-
3
-
-
0024770143
-
Towards optimal distributed consensus
-
Berman, P.J., Garray, J., Perry, J.: Towards optimal distributed consensus. In: FOCS 1989, pp. 410-415 (1989);
-
(1989)
FOCS 1989
, pp. 410-415
-
-
Berman, P.J.1
Garray, J.2
Perry, J.3
-
5
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computation
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation. In: STOC 1988, pp. 1-10 (1988)
-
(1988)
STOC 1988
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
38349072001
-
Efficient Byzantine agreement with faulty minority
-
Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
-
Beerliova-Trubiniova, Z., Hirt, M., Riser, M.: Efficient Byzantine agreement with faulty minority. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 393-409. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 393-409
-
-
Beerliova-Trubiniova, Z.1
Hirt, M.2
Riser, M.3
-
7
-
-
85008184918
-
Asynchronous secure computations with optimal resilience
-
(extended abstract). ACM, New York
-
Ben-Or, M., Kelmer, B., Rabin, T.: Asynchronous secure computations with optimal resilience (extended abstract). In: PODC 1994, pp. 183-192. ACM, New York (1994)
-
(1994)
PODC 1994
, pp. 183-192
-
-
Ben-Or, M.1
Kelmer, B.2
Rabin, T.3
-
8
-
-
85029623402
-
Unconditional Byzantine agreement with good majority
-
Jantzen, M., Choffrut, C. (eds.) STACS 1991. Springer, Heidelberg
-
Baum-Waidner, B., Pfitzmann, B., Waidner, M.: Unconditional Byzantine agreement with good majority. In: Jantzen, M., Choffrut, C. (eds.) STACS 1991. LNCS, vol. 480, pp. 285-295. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.480
, pp. 285-295
-
-
Baum-Waidner, B.1
Pfitzmann, B.2
Waidner, M.3
-
9
-
-
0011797655
-
An asynchronou [(n-1)/3]-resilient consensus protocol
-
Bracha, G.: An asynchronou [(n-1)/3]-resilient consensus protocol. In: PODC 1984, pp. 154-162 (1984)
-
(1984)
PODC 1984
, pp. 154-162
-
-
Bracha, G.1
-
10
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 143-202 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
11
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS 2001, pp. 136-145 (2001)
-
(2001)
FOCS 2001
, pp. 136-145
-
-
Canetti, R.1
-
13
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
extended abstract
-
Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols (extended abstract). In: STOC 1988, pp. 11-19 (1988)
-
(1988)
STOC 1988
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
14
-
-
84957717648
-
Efficient multiparty computations secure against an adaptive adversary
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Cramer, R., Damgård, I., Dziembowski, S., Hirt,M., Rabin, T.: Efficient multiparty computations secure against an adaptive adversary. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 311-326. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 311-326
-
-
Cramer, R.1
Damgård, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
15
-
-
0022199386
-
VERIFIABLE SECRET SHARING and ACHIEVING SIMULTANEITY in the PRESENCE of FAULTS
-
Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: Verifiable secret sharing and achieving simultaneity in the presence of faults. In: FOCS 1985, pp. 383-395 (1985) (Pubitemid 16541437)
-
(1985)
Annual Symposium on Foundations of Computer Science (Proceedings)
, pp. 383-395
-
-
Choc, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
16
-
-
84949308005
-
Achieving independence in logarithmic number of rounds
-
Chor, B., Rabin, M.O.: Achieving independence in logarithmic number of rounds. In: PODC 1987, pp. 260-268 (1987)
-
(1987)
PODC 1987
, pp. 260-268
-
-
Chor, B.1
Rabin, M.O.2
-
17
-
-
0024942275
-
Modular construction of nearly optimal Byzantine agreement protocols
-
Coan, B.A., Welch, J.L.: Modular construction of nearly optimal Byzantine agreement protocols. In: PODC 1989, pp. 295-305 (1989);
-
(1989)
PODC 1989
, pp. 295-305
-
-
Coan, B.A.1
Welch, J.L.2
-
19
-
-
0020097405
-
An efficient algorithm for Byzantine agreement without authentication
-
Dolev, D., Fischer, M.J., Fowler, R., Lynch, N.A., Strong, H.R.: An efficient algorithm for Byzantine agreement without authentication. Information and Control 52(3), 257-274 (1982)
-
(1982)
Information and Control
, vol.52
, Issue.3
, pp. 257-274
-
-
Dolev, D.1
Fischer, M.J.2
Fowler, R.3
Lynch, N.A.4
Strong, H.R.5
-
20
-
-
85051365925
-
Polynomial algorithms for multiple processor agreement
-
Dolev, D., Strong, H.R.: Polynomial algorithms for multiple processor agreement. In: STOC 1982, pp. 401-407 (1982);
-
(1982)
STOC 1982
, pp. 401-407
-
-
Dolev, D.1
Strong, H.R.2
-
21
-
-
0001683636
-
-
Full version in
-
Full version in SIAM Journal on Computing 12(4), 656-666 (1983)
-
(1983)
SIAM Journal on Computing
, vol.12
, Issue.4
, pp. 656-666
-
-
-
23
-
-
0022562351
-
Easy impossibility proofs for distributed consensus problems
-
Fischer, M.J., Lynch, N.A., Merritt, M.: Easy impossibility proofs for distributed consensus problems. Distributed Computing 1, 26-39 (1986)
-
(1986)
Distributed Computing
, vol.1
, pp. 26-39
-
-
Fischer, M.J.1
Lynch, N.A.2
Merritt, M.3
-
24
-
-
84894281582
-
Optimal algorithms for Byzantine agreement
-
Feldman, P., Micali, S.: Optimal algorithms for Byzantine agreement. In: STOC 1988, pp. 148-161 (1988)
-
(1988)
STOC 1988
, pp. 148-161
-
-
Feldman, P.1
Micali, S.2
-
25
-
-
0029181976
-
Achieving independence efficiently and securely
-
Gennaro, R.: Achieving independence efficiently and securely. In: PODC 1995, pp. 130-136 (1995)
-
(1995)
PODC 1995
, pp. 130-136
-
-
Gennaro, R.1
-
26
-
-
0034228830
-
A protocol to achieve independence in constant rounds
-
Gennaro, R.: A protocol to achieve independence in constant rounds. IEEE Trans. Parallel Distrib. Syst. 11(7), 636-647 (2000)
-
(2000)
IEEE Trans. Parallel Distrib. Syst.
, vol.11
, Issue.7
, pp. 636-647
-
-
Gennaro, R.1
-
27
-
-
84947284060
-
Secure computation without agreement
-
Malkhi, D. (ed.) DISC 2002. Springer, Heidelberg
-
Goldwasser, S., Lindell, Y.: Secure computation without agreement. In: Malkhi, D. (ed.) DISC 2002. LNCS, vol. 2508, pp. 17-32. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2508
, pp. 17-32
-
-
Goldwasser, S.1
Lindell, Y.2
-
28
-
-
0027149398
-
Fully polynomial Byzantine agreement in t+1 rounds
-
Garay, J.A., Moses, Y.: Fully polynomial Byzantine agreement in t+1 rounds. In: STOC 1993, pp. 31-41 (1993)
-
(1993)
STOC 1993
, pp. 31-41
-
-
Garay, J.A.1
Moses, Y.2
-
29
-
-
33750001509
-
Universally composable simultaneous broadcast
-
De Prisco, R., Yung, M. (eds.) SCN 2006. Springer, Heidelberg
-
Hevia, A.: Universally composable simultaneous broadcast. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 18-33. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4116
, pp. 18-33
-
-
Hevia, A.1
-
30
-
-
32344443727
-
Simultaneous broadcast revisited
-
Hevia, A., Micciancio, D.: Simultaneous broadcast revisited. In: PODC 2005, pp. 324-333 (2005)
-
(2005)
PODC 2005
, pp. 324-333
-
-
Hevia, A.1
Micciancio, D.2
-
31
-
-
77954644147
-
-
Karlin, A., Yao, A.C.: Manuscript (1984)
-
Karlin, A., Yao, A.C.: Manuscript (1984)
-
-
-
-
32
-
-
0036038649
-
On the composition of authenticated Byzantine agreement
-
Lindell, Y., Lysyanskaya, A., Rabin, T.: On the composition of authenticated Byzantine agreement. In: STOC 2002, pp. 514-523 (2002)
-
(2002)
STOC 2002
, pp. 514-523
-
-
Lindell, Y.1
Lysyanskaya, A.2
Rabin, T.3
-
33
-
-
84976699318
-
The Byzantine generals problem
-
Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Transactions on Programming Languages and Systems 4(3), 382-401 (1982)
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
35
-
-
85008202321
-
Unconditional Byzantine agreement for any number of faulty processors
-
STACS 1992.
-
Pfitzmann, B.,Waidner, M.: Unconditional Byzantine agreement for any number of faulty processors. In: STACS 1992. LNCS, vol. 577, pp. 339-350 (1992)
-
(1992)
LNCS
, vol.577
, pp. 339-350
-
-
Pfitzmann, B.1
Waidner, M.2
-
36
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: STOC 1989, pp. 73-85 (1989)
-
(1989)
STOC 1989
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
37
-
-
0023364750
-
Fast distributed agreement
-
Toueg, S., Perry, K.J., Srikanth, T.K.: Fast distributed agreement. SIAM J. Comput. 16(3), 445-457 (1987)
-
(1987)
SIAM J. Comput.
, vol.16
, Issue.3
, pp. 445-457
-
-
Toueg, S.1
Perry, K.J.2
Srikanth, T.K.3
|