-
3
-
-
0024132071
-
Achieving oblivious transfer using weakened security assumptions (extended abstract)
-
Crépeau, C., Kilian, J.: Achieving oblivious transfer using weakened security assumptions (extended abstract). In: FOCS, pp. 42-52 (1988)
-
(1988)
FOCS
, pp. 42-52
-
-
Crépeau, C.1
Kilian, J.2
-
4
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
Maurer, U.M.: Conditionally-perfect secrecy and a provably-secure randomized cipher. J. Cryptology 5(1), 53-66 (1992)
-
(1992)
J. Cryptology
, vol.5
, Issue.1
, pp. 53-66
-
-
Maurer, U.M.1
-
5
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract)
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In: STOC, pp. 1-10 (1988)
-
(1988)
STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
84898947315
-
Multiparty unconditionally secure protocols (extended abstract)
-
Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols (extended abstract). In: STOC, pp. 11-19 (1988)
-
(1988)
STOC
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
7
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority (extended abstract)
-
Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority (extended abstract). In: STOC, pp. 73-85 (1989)
-
(1989)
STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
8
-
-
84898945449
-
Multi-prover interactive proofs: How to remove intractability assumptions
-
Ben-Or, M., Goldwasser, S., Kilian, J., Wigderson, A.: Multi-prover interactive proofs: How to remove intractability assumptions. In: STOC, pp. 113-131 (1988)
-
(1988)
STOC
, pp. 113-131
-
-
Ben-Or, M.1
Goldwasser, S.2
Kilian, J.3
Wigderson, A.4
-
9
-
-
44449101614
-
David and goliath commitments: Uc computation for asymmetric parties using tamper-proof hardware
-
Smart, N.P. (ed.) LNCS Springer, Heidelberg
-
Moran, T., Segev, G.: David and Goliath commitments: UC computation for asymmetric parties using tamper-proof hardware. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 527-544. Springer, Heidelberg (2008)
-
(2008)
EUROCRYPT 2008
, vol.4965
, pp. 527-544
-
-
Moran, T.1
Segev, G.2
-
10
-
-
77949605211
-
Founding cryptography on tamper-proof hardware tokens
-
Micciancio, D. (ed.) LNCS Springer, Heidelberg
-
Goyal, V., Ishai, Y., Sahai, A., Venkatesan, R., Wadia, A.: Founding cryptography on tamper-proof hardware tokens. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 308-326. Springer, Heidelberg (2010)
-
(2010)
TCC 2010
, vol.5978
, pp. 308-326
-
-
Goyal, V.1
Ishai, Y.2
Sahai, A.3
Venkatesan, R.4
Wadia, A.5
-
11
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
Preliminary version in STOC 1985 (1985)
-
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal on Computing 18(1), 186-208 (1989); Preliminary version in STOC 1985 (1985)
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
12
-
-
71149116146
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
-
Preliminary version in FOCS 1986 (1986)
-
Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. Journal of the ACM 38(1), 691-729 (1991); Preliminary version in FOCS 1986 (1986)
-
(1991)
Journal of the ACM
, vol.38
, Issue.1
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
14
-
-
0026172266
-
Statistical zero-knowledge languages can be recognized in two rounds
-
Aiello, W., Håstad, J.: Statistical zero-knowledge languages can be recognized in two rounds. J. Comput. Syst. Sci. 42(3), 327-345 (1991)
-
(1991)
J. Comput. Syst. Sci.
, vol.42
, Issue.3
, pp. 327-345
-
-
Aiello, W.1
Håstad, J.2
-
15
-
-
0008519096
-
One-way fuctions are essential for non-trivial zero-knowledge
-
Ostrovsky, R., Wigderson, A.: One-way fuctions are essential for non-trivial zero-knowledge. In: ISTCS, pp. 3-17 (1993)
-
(1993)
ISTCS
, pp. 3-17
-
-
Ostrovsky, R.1
Wigderson, A.2
-
16
-
-
0000610204
-
A one-round, two-prover, zero-knowledge protocol for np
-
Lapidot, D., Shamir, A.: A one-round, two-prover, zero-knowledge protocol for np. Combinatorica 15(2), 204-214 (1995)
-
(1995)
Combinatorica
, vol.15
, Issue.2
, pp. 204-214
-
-
Lapidot, D.1
Shamir, A.2
-
17
-
-
0025791374
-
Non-deterministic exponential time has two-prover interactive protocols
-
Babai, L., Fortnow, L., Lund, C.: Non-deterministic exponential time has two-prover interactive protocols. In: FOCS, pp. 16-25 (1990)
-
(1990)
FOCS
, pp. 16-25
-
-
Babai, L.1
Fortnow, L.2
Lund, C.3
-
18
-
-
84957719173
-
Low communication 2-prover zero-knowledge proofs for np
-
Brickell, E.F. (ed.) LNCS Springer, Heidelberg
-
Dwork, C., Feige, U., Kilian, J., Naor, M., Safra, S.: Low communication 2-prover zero-knowledge proofs for np. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 215-227. Springer, Heidelberg (1993)
-
(1993)
CRYPTO 1992
, vol.740
, pp. 215-227
-
-
Dwork, C.1
Feige, U.2
Kilian, J.3
Naor, M.4
Safra, S.5
-
19
-
-
0031651077
-
Probabilistic checking of proofs: A new characterization of np
-
Arora, S., Safra, S.: Probabilistic checking of proofs: A new characterization of np. J. ACM 45(1), 70-122 (1998)
-
(1998)
J. ACM
, vol.45
, Issue.1
, pp. 70-122
-
-
Arora, S.1
Safra, S.2
-
20
-
-
0032058198
-
Proof verification and the hardness of approximation problems
-
Arora, S., Lund, C., Motwani, R., Sudan, M., Szegedy, M.: Proof verification and the hardness of approximation problems. J. ACM 45(3), 501-555 (1998)
-
(1998)
J. ACM
, vol.45
, Issue.3
, pp. 501-555
-
-
Arora, S.1
Lund, C.2
Motwani, R.3
Sudan, M.4
Szegedy, M.5
-
21
-
-
0023728126
-
On the power of multi-prover interactive protocols
-
Fortnow, L., Rompel, J., Sipser, M.: On the power of multi-prover interactive protocols. In: Theoretical Computer Science, pp. 156-161 (1988)
-
(1988)
Theoretical Computer Science
, pp. 156-161
-
-
Fortnow, L.1
Rompel, J.2
Sipser, M.3
-
22
-
-
0033723965
-
Resettable zero-knowledge (extended abstract)
-
Canetti, R., Goldreich, O., Goldwasser, S., Micali, S.: Resettable zero-knowledge (extended abstract). In: STOC, pp. 235-244 (2000)
-
(2000)
STOC
, pp. 235-244
-
-
Canetti, R.1
Goldreich, O.2
Goldwasser, S.3
Micali, S.4
-
24
-
-
49049120522
-
Interactive PCP
-
Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) LNCS Springer, Heidelberg
-
Kalai, Y.T., Raz, R.: Interactive PCP. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 536-547. Springer, Heidelberg (2008)
-
(2008)
ICALP 2008
, vol.5126
, Issue.PART II
, pp. 536-547
-
-
Kalai, Y.T.1
Raz, R.2
-
25
-
-
57049095424
-
Delegating computation: Interactive proofs for muggles
-
Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: Delegating computation: interactive proofs for muggles. In: STOC, pp. 113-122 (2008)
-
(2008)
STOC
, pp. 113-122
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.N.3
-
26
-
-
0141544069
-
Perfect zero-knowledge arguments for NP using any one-way permutation
-
Preliminary version in CRYPTO 1992 (1992)
-
Naor, M., Ostrovsky, R., Venkatesan, R., Yung, M.: Perfect zero-knowledge arguments for NP using any one-way permutation. Journal of Cryptology 11(2), 87-108 (1998); Preliminary version in CRYPTO 1992 (1992)
-
(1998)
Journal of Cryptology
, vol.11
, Issue.2
, pp. 87-108
-
-
Naor, M.1
Ostrovsky, R.2
Venkatesan, R.3
Yung, M.4
-
27
-
-
1542660671
-
Fair games against an all-powerful adversary
-
Preliminary version in SEQUENCES 1991 (1991)
-
Ostrovsky, R., Venkatesan, R., Yung, M.: Fair games against an all-powerful adversary. In: AMS DIMACS Series in Discrete Mathematics and Theoretical Computer Science, pp. 155-169 (1993); Preliminary version in SEQUENCES 1991 (1991)
-
(1993)
AMS DIMACS Series in Discrete Mathematics and Theoretical Computer Science
, pp. 155-169
-
-
Ostrovsky, R.1
Venkatesan, R.2
Yung, M.3
-
28
-
-
35048840744
-
Constant-round oblivious transfer in the bounded storage model
-
Naor, M. (ed.) LNCS Springer, Heidelberg
-
Ding, Y.Z., Harnik, D., Rosen, A., Shaltiel, R.: Constant-round oblivious transfer in the bounded storage model. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 446-472. Springer, Heidelberg (2004)
-
(2004)
TCC 2004
, vol.2951
, pp. 446-472
-
-
Ding, Y.Z.1
Harnik, D.2
Rosen, A.3
Shaltiel, R.4
-
29
-
-
34748815778
-
A new interactive hashing theorem
-
See also preliminary draft of full version at the first author's home page
-
Haitner, I., Reingold, O.: A new interactive hashing theorem. In: IEEE Conference on Computational Complexity, pp. 319-332 (2007); See also preliminary draft of full version at the first author's home page
-
(2007)
IEEE Conference on Computational Complexity
, pp. 319-332
-
-
Haitner, I.1
Reingold, O.2
-
30
-
-
38049150653
-
Universally composable multi-party computation using tamper-proof hardware
-
Naor, M. (ed.) LNCS Springer, Heidelberg
-
Katz, J.: Universally composable multi-party computation using tamper-proof hardware. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 115-128. Springer, Heidelberg (2007)
-
(2007)
EUROCRYPT 2007
, vol.4515
, pp. 115-128
-
-
Katz, J.1
-
31
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136-145 (2001)
-
(2001)
FOCS
, pp. 136-145
-
-
Canetti, R.1
-
32
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious rams. J. ACM 43(3), 431-473 (1996)
-
(1996)
J. ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
33
-
-
51849168583
-
One-time programs
-
Wagner, D. (ed.) LNCS Springer, Heidelberg
-
Goldwasser, S., Kalai, Y.T., Rothblum, G.: One-time programs. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 39-56. Springer, Heidelberg (2008)
-
(2008)
CRYPTO 2008
, vol.5157
, pp. 39-56
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.3
-
35
-
-
44449151536
-
New constructions for UC secure computation using tamper-proof hardware
-
Smart, N.P. (ed.) LNCS Springer, Heidelberg
-
Chandran, N., Goyal, V., Sahai, A.: New constructions for UC secure computation using tamper-proof hardware. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 545-562. Springer, Heidelberg (2008)
-
(2008)
EUROCRYPT 2008
, vol.4965
, pp. 545-562
-
-
Chandran, N.1
Goyal, V.2
Sahai, A.3
-
36
-
-
77949599668
-
Truly efficient string oblivious transfer using resettable tamper-proof tokens
-
Micciancio, D. (ed.) LNCS Springer, Heidelberg
-
Kolesnikov, V.: Truly efficient string oblivious transfer using resettable tamper-proof tokens. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 327-342. Springer, Heidelberg (2010)
-
(2010)
TCC 2010
, vol.5978
, pp. 327-342
-
-
Kolesnikov, V.1
-
37
-
-
51849102397
-
Founding cryptography on oblivious transfer - Efficiently
-
Wagner, D. (ed.) LNCS Springer, Heidelberg
-
Ishai, Y., Prabhakaran, M., Sahai, A.: Founding cryptography on oblivious transfer - efficiently. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 572-591. Springer, Heidelberg (2008)
-
(2008)
CRYPTO 2008
, vol.5157
, pp. 572-591
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
-
38
-
-
70350668805
-
Inaccessible entropy
-
Haitner, I., Reingold, O., Vadhan, S.P., Wee, H.: Inaccessible entropy. In: STOC, pp. 611-620 (2009)
-
(2009)
STOC
, pp. 611-620
-
-
Haitner, I.1
Reingold, O.2
Vadhan, S.P.3
Wee, H.4
-
40
-
-
85031771268
-
Everything provable is provable in zero-knowledge
-
Goldwasser, S. (ed.) LNCS Springer, Heidelberg
-
Ben-Or, M., Goldreich, O., Goldwasser, S., Håstad, J., Kilian, J., Micali, S., Ro-gaway, P.: Everything provable is provable in zero-knowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 37-56. Springer, Heidelberg (1990)
-
(1990)
CRYPTO 1988
, vol.403
, pp. 37-56
-
-
Ben-Or, M.1
Goldreich, O.2
Goldwasser, S.3
Håstad, J.4
Kilian, J.5
Micali, S.6
Rogaway, P.7
|