-
1
-
-
38049082907
-
Security against covert adversaries: Efficient protocols for realistic adversaries
-
Lecture Notes in Comput. Sci. 4392, Springer, Berlin
-
Y. Aumann and Y. Lindell, Security against covert adversaries: Efficient protocols for realistic adversaries, in Proceedings of the 4th Annual Theory of Cryptography Conference (TCC 2007), Lecture Notes in Comput. Sci. 4392, Springer, Berlin, 2007, pp. 137-156.
-
(2007)
Proceedings of the 4th Annual Theory of Cryptography Conference (TCC 2007)
, pp. 137-156
-
-
Aumann, Y.1
Lindell, Y.2
-
2
-
-
85032862464
-
Multiparty protocols tolerating half faulty processors
-
Lecture Notes in Comput. Sci. 435, Springer- Verlag, New York
-
D. Beaver, Multiparty protocols tolerating half faulty processors, in Advances in Cryptology (Crypto'89), Lecture Notes in Comput. Sci. 435, Springer-Verlag, New York, 1990, pp. 560-572.
-
(1990)
Advances in Cryptology (Crypto'89)
, pp. 560-572
-
-
Beaver, D.1
-
4
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computation
-
ACM Press, New York
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, Completeness theorems for noncryptographic fault-tolerant distributed computation, in Proceedings of the 20th Annual ACM Symposium on Theory of Computing (STOC), ACM Press, New York, 1988, pp. 1-10.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti, Security and composition of multiparty cryptographic protocols, J. Cryptology, 13 (2000), pp. 143-202.
-
(2000)
J. Cryptology
, vol.13
, pp. 143-202
-
-
Canetti, R.1
-
6
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti, Universally composable security: A new paradigm for cryptographic protocols, in Proceedings of the 42nd Annual Symposium on Foundations of Computer Science (FOCS), IEEE, Piscataway, NJ, 2001, pp. 136-145. (Pubitemid 33068374)
-
(2001)
Annual Symposium on Foundations of Computer Science - Proceedings
, pp. 136-145
-
-
Canetti, R.1
-
7
-
-
78751492310
-
Security and composition of cryptographic protocols: A tutorial (part I)
-
R. Canetti, Security and composition of cryptographic protocols: A tutorial (part I), SIGACT News, 37 (2006), pp. 67-92.
-
(2006)
SIGACT News
, vol.37
, pp. 67-92
-
-
Canetti, R.1
-
8
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
ACM Press, New York
-
D. Chaum, C. Crépeau, and I. Damgård, Multiparty unconditionally secure protocols, in Proceedings of the 20th Annual ACM Symposium on Theory of Computing (STOC), ACM Press, New York, 1988, pp. 11-19.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgard, I.3
-
10
-
-
84957717648
-
Efficient multiparty computations secure against an adaptive adversary
-
Lecture Notes in Comput. Sci. 1592, Springer- Verlag, Berlin
-
R. Cramer, I. Damgård, S. Dziembowski, M. Hirt, and T. Rabin, Efficient multiparty computations secure against an adaptive adversary, in Advances in Cryptology (Eurocrypt'99), Lecture Notes in Comput. Sci. 1592, Springer-Verlag, Berlin, 1999, pp. 311-326.
-
(1999)
Advances in Cryptology (Eurocrypt'99)
, pp. 311-326
-
-
Cramer, R.1
Damgard, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
12
-
-
0023545076
-
COMPLETENESS THEOREM FOR PROTOCOLS WITH HONEST MAJORITY.
-
O. Goldreich, S. Micali, and A. Wigderson, How to play any mental game, or a completeness theorem for protocols with honest majority, in Proceedings of the 19th Annual ACM Symposium on Theory of Computing (STOC), ACM Press, New York, 1987, pp. 218-229. (Pubitemid 18643409)
-
(1987)
Conference Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich Oded1
Micali Silvio2
Wigderson Avi3
-
13
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
Lecture Notes in Comput. Sci. 537, Springer- Verlag, Berlin
-
S. Goldwasser and L. A. Levin, Fair computation of general functions in presence of immoral majority, in Advances in Cryptology (Crypto'90), Lecture Notes in Comput. Sci. 537, Springer-Verlag, Berlin, 1991, pp. 77-93.
-
(1991)
Advances in Cryptology (Crypto'90)
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.A.2
-
14
-
-
22344432877
-
Secure multi-party computation without agreement
-
DOI 10.1007/s00145-005-0319-z
-
S. Goldwasser and Y. Lindell, Secure multiparty computation without agreement, J. Cryptology, 18 (2005), pp. 247-287. (Pubitemid 40997661)
-
(2005)
Journal of Cryptology
, vol.18
, Issue.3
, pp. 247-287
-
-
Goldwasser, S.1
Lindell, Y.2
-
15
-
-
57049135299
-
Complete fairness in secure two-party computation
-
ACM Press, New York
-
S. D. Gordon, C. Hazay, J. Katz, and Y. Lindell, Complete fairness in secure two-party computation, in Proceedings of the 40th Annual ACM Symposium on Theory of Computing (STOC), ACM Press, New York, 2008, pp. 413-422.
-
(2008)
Proceedings of the 40th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 413-422
-
-
Gordon, S.D.1
Hazay, C.2
Katz, J.3
Lindell, Y.4
-
16
-
-
70350630630
-
Complete fairness in multiparty computation without an honest majority
-
Lecture Notes in Comput. Sci. 5444, Springer, Berlin
-
S. D. Gordon and J. Katz, Complete fairness in multiparty computation without an honest majority, in Proceedings of the 6th Annual Theory of Cryptography Conference (TCC 2009), Lecture Notes in Comput. Sci. 5444, Springer, Berlin, 2009, pp. 19-35.
-
(2009)
Proceedings of the 6th Annual Theory of Cryptography Conference (TCC 2009)
, pp. 19-35
-
-
Gordon, S.D.1
Katz, J.2
-
17
-
-
77954649870
-
Partial fairness in secure two-party computation
-
Lecture Notes in Comput. Sci. 6110, Springer, Berlin
-
S. D. Gordon and J. Katz, Partial fairness in secure two-party computation, in Advances in Cryptology (Eurocrypt 2010), Lecture Notes in Comput. Sci. 6110, Springer, Berlin, 2010, pp. 157-176.
-
(2010)
Advances in Cryptology (Eurocrypt 2010)
, pp. 157-176
-
-
Gordon, S.D.1
Katz, J.2
-
18
-
-
33749547215
-
On combining privacy with guaranteed output delivery in secure multiparty computation
-
Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
-
Y. Ishai, E. Kushilevitz, Y. Lindell, and E. Petrank, On combining privacy with guaranteed output delivery in secure multiparty computation, in Advances in Cryptology (Crypto 2006), Lecture Notes in Comput. Sci. 4117, Springer-Verlag, Berlin, 2006, pp. 483-500. (Pubitemid 44532134)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4117
, pp. 483-500
-
-
Ishai, Y.1
Kushilevitz, E.2
Lindell, Y.3
Petrank, E.4
-
19
-
-
35448952561
-
On achieving the "best of both worlds" in secure multiparty computation
-
DOI 10.1145/1250790.1250793, STOC'07: Proceedings of the 39th Annual ACM Symposium on Theory of Computing
-
J. Katz, On achieving the "best of both worlds" in secure multiparty computation, in Proceedings of the 39th Annual ACM Symposium on Theory of Computing (STOC), ACM Press, New York, 2007, pp. 11-20. (Pubitemid 47630716)
-
(2007)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 11-20
-
-
Katz, J.1
-
20
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
ACM Press, New York
-
T. Rabin and M. Ben-Or, Verifiable secret sharing and multiparty protocols with honest majority, in Proceedings of the 21st Annual ACM Symposium on Theory of Computing (STOC), ACM Press, New York, 1989, pp 73-85.
-
(1989)
Proceedings of the 21st Annual ACM Symposium on Theory of Computing (STOC)
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
21
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Comm. ACM, 22 (1979), pp. 612-613.
-
(1979)
Comm. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
22
-
-
0022882770
-
How to generate and exchange secrets
-
IEEE, Piscataway, NJ
-
A. C.-C. Yao, How to generate and exchange secrets, in Proceedings of the 27th Annual Symposium on Foundations of Computer Science (FOCS), IEEE, Piscataway, NJ, 1986, pp. 162-167.
-
(1986)
Proceedings of the 27th Annual Symposium on Foundations of Computer Science (FOCS)
, pp. 162-167
-
-
Yao, A.C.-C.1
|