-
1
-
-
33746028196
-
Perfect privacy for two-party protocols
-
Feigenbaum, J., Merritt, M. (eds.) American Mathematical Society, Providence
-
Beaver, D.: Perfect privacy for two-party protocols. In: Feigenbaum, J., Merritt, M. (eds.) Proceedings of DIMACS Workshop on Distributed Computing and Cryptography, vol. 2, pp. 65-77. American Mathematical Society, Providence (1989)
-
(1989)
Proceedings of DIMACS Workshop on Distributed Computing and Cryptography
, vol.2
, pp. 65-77
-
-
Beaver, D.1
-
2
-
-
84928743703
-
Precomputing oblivious transfer
-
Coppersmith, D. (ed.) CRYPTO 1995. Springer, Heidelberg
-
Beaver, D.: Precomputing oblivious transfer. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 97-109. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.963
, pp. 97-109
-
-
Beaver, D.1
-
3
-
-
0003153237
-
Non-interactive zero-knowledge and its applications (extended abstract)
-
ACM, New York
-
Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications (extended abstract). In: STOC, pp. 103-112. ACM, New York (1988)
-
(1988)
STOC
, pp. 103-112
-
-
Blum, M.1
Feldman, P.2
Micali, S.3
-
5
-
-
83755165101
-
A unified framework for analyzing security of protocols
-
Previous version availabe at the ECCC archive TR01-016, Extended abstract in
-
Previous version "A unified framework for analyzing security of protocols" availabe at the ECCC archive TR01-016, Extended abstract in FOCS 2001
-
FOCS 2001
-
-
-
6
-
-
0036038991
-
Universally composable two-party computation
-
ACM, New York
-
Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally composable two-party computation. In: Proc. 34th STOC, pp. 494-503. ACM, New York (2002)
-
(2002)
Proc. 34th STOC
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
7
-
-
0024860209
-
A zero-one law for boolean privacy
-
(extended abstract). ACM, New York
-
Chor, B., Kushilevitz, E.: A zero-one law for boolean privacy (extended abstract). In: STOC, pp. 62-72. ACM, New York (1989)
-
(1989)
STOC
, pp. 62-72
-
-
Chor, B.1
Kushilevitz, E.2
-
8
-
-
0012610677
-
Limits on the security of coin flips when half the processors are faulty
-
(extended abstract). ACM, New York
-
Cleve, R.: Limits on the security of coin flips when half the processors are faulty (extended abstract). In: STOC, pp. 364-369. ACM, New York (1986)
-
(1986)
STOC
, pp. 364-369
-
-
Cleve, R.1
-
10
-
-
79953173362
-
On the necessary and sufficient assumptions for UC computation
-
Report 2009/247
-
Damgård, I., Nielsen, J.B., Orlandi, C.: On the necessary and sufficient assumptions for UC computation. Cryptology ePrint Archive, Report 2009/247 (2009), http://eprint.iacr.org/
-
(2009)
Cryptology EPrint Archive
-
-
Damgård, I.1
Nielsen, J.B.2
Orlandi, C.3
-
11
-
-
0024770898
-
One-way functions are essential for complexity based cryptography
-
IEEE, Los Alamitos
-
Impagliazzo, R., Luby, M.: One-way functions are essential for complexity based cryptography. In: Proc. 30th FOCS, pp. 230-235. IEEE, Los Alamitos (1989)
-
(1989)
Proc. 30th FOCS
, pp. 230-235
-
-
Impagliazzo, R.1
Luby, M.2
-
12
-
-
0033706604
-
More general completeness theorems for secure two-party computation
-
ACM, New York
-
Kilian, J.: More general completeness theorems for secure two-party computation. In: Proc. 32th STOC, pp. 316-324. ACM, New York (2000)
-
(2000)
Proc. 32th STOC
, pp. 316-324
-
-
Kilian, J.1
-
13
-
-
70350657209
-
Secure computability of functions in the it setting with dishonest majority and applications to long-term security
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Künzler, R., Müller-Quade, J., Raub, D.: Secure computability of functions in the it setting with dishonest majority and applications to long-term security. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 238-255. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 238-255
-
-
Künzler, R.1
Müller-Quade, J.2
Raub, D.3
-
14
-
-
0024768184
-
Privacy and communication complexity
-
IEEE, Los Alamitos
-
Kushilevitz, E.: Privacy and communication complexity. In: FOCS, pp. 416-421. IEEE, Los Alamitos (1989)
-
(1989)
FOCS
, pp. 416-421
-
-
Kushilevitz, E.1
-
15
-
-
79953197899
-
Exploring the limits of common coins using frontier analysis of protocols
-
Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
-
Maji, H.K., Ouppaphan, P., Prabhakaran, M., Rosulek, M.: Exploring the limits of common coins using frontier analysis of protocols. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 486-503. Springer, Heidelberg (2011), http://eprint.iacr.org/
-
(2011)
LNCS
, vol.6597
, pp. 486-503
-
-
Maji, H.K.1
Ouppaphan, P.2
Prabhakaran, M.3
Rosulek, M.4
-
16
-
-
70350679063
-
Complexity of multi-party computation problems: The case of 2-party symmetric secure function evaluation
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Maji, H.K., Prabhakaran, M., Rosulek, M.: Complexity of multi-party computation problems: The case of 2-party symmetric secure function evaluation. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 256-273. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 256-273
-
-
Maji, H.K.1
Prabhakaran, M.2
Rosulek, M.3
-
17
-
-
77956988543
-
Cryptographic complexity classes and computational intractability assumptions
-
Yao, A.C.-C. (ed.) Tsinghua University Press, Beijing
-
Maji, H.K., Prabhakaran, M., Rosulek, M.: Cryptographic complexity classes and computational intractability assumptions. In: Yao, A.C.-C. (ed.) ICS, pp. 266-289. Tsinghua University Press, Beijing (2010)
-
(2010)
ICS
, pp. 266-289
-
-
Maji, H.K.1
Prabhakaran, M.2
Rosulek, M.3
-
18
-
-
77956989091
-
A zero-one law for cryptographic complexity with respect to computational UC security
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Maji, H.K., Prabhakaran, M., Rosulek, M.: A zero-one law for cryptographic complexity with respect to computational UC security. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 595-612. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 595-612
-
-
Maji, H.K.1
Prabhakaran, M.2
Rosulek, M.3
-
19
-
-
70350649064
-
An optimally fair coin toss
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Moran, T., Naor, M., Segev, G.: An optimally fair coin toss. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 1-18. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 1-18
-
-
Moran, T.1
Naor, M.2
Segev, G.3
-
20
-
-
51849126899
-
Cryptographic complexity of multi-party computation problems: Classifications and separations
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Prabhakaran, M., Rosulek, M.: Cryptographic complexity of multi-party computation problems: Classifications and separations. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 262-279. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 262-279
-
-
Prabhakaran, M.1
Rosulek, M.2
-
21
-
-
0020312165
-
Protocols for secure computation
-
IEEE, Los Alamitos
-
Yao, A.C.: Protocols for secure computation. In: Proc. 23rd FOCS, pp. 160-164. IEEE, Los Alamitos (1982)
-
(1982)
Proc. 23rd FOCS
, pp. 160-164
-
-
Yao, A.C.1
|