-
1
-
-
84928743703
-
Precomputing oblivious transfer
-
Coppersmith, D. ed., Springer, Heidelberg
-
Beaver, D.: Precomputing Oblivious Transfer. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 97-109. Springer, Heidelberg (1995)
-
(1995)
CRYPTO 1995. LNCS
, vol.963
, pp. 97-109
-
-
Beaver, D.1
-
2
-
-
35048856983
-
A quantitative approach to reductions in secure computation
-
Naor, M. ed., Springer, Heidelberg
-
Beimel, A., Malkin, T.: A Quantitative Approach to Reductions in Secure Computation. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 238-257. Springer, Heidelberg (2004)
-
(2004)
TCC 2004. LNCS
, vol.2951
, pp. 238-257
-
-
Beimel, A.1
Malkin, T.2
-
3
-
-
84969361843
-
Practical quantum oblivious transfer
-
Feigenbaum, J. ed., Springer, Heidelberg
-
Bennett, C. H., Brassard, G., Crépeau, C., Skubiszewska, M.-H.: Practical Quantum Oblivious Transfer. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 351-366. Springer, Heidelberg (1992)
-
(1992)
CRYPTO 1991. LNCS
, vol.576
, pp. 351-366
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Skubiszewska, M.-H.4
-
4
-
-
17744380057
-
Coin flipping by telephone a protocol for solving impossible problems
-
Blum, M.: Coin flipping by telephone a protocol for solving impossible problems. SIGACT News 15(1), 23-27(1983)
-
(1983)
SIGACT News
, vol.15
, Issue.1
, pp. 23-27
-
-
Blum, M.1
-
5
-
-
33646750687
-
Constructions and bounds for unconditionally secure non-interactive commitment schemes
-
Blundo, C., Masucci, B., Stinson, D. R., Wei, R.: Constructions and bounds for unconditionally secure non-interactive commitment schemes. Des. Codes Cryptography 26, 97-110(2002)
-
(2002)
Des. Codes Cryptography
, vol.26
, pp. 97-110
-
-
Blundo, C.1
Masucci, B.2
Stinson, D.R.3
Wei, R.4
-
6
-
-
0042008122
-
Constructions of generalized superimposed codes with applications to group testing and conflict resolution in multiple access channels
-
De Bonis, A., Vaccaro, U.: Constructions of generalized superimposed codes with applications to group testing and conflict resolution in multiple access channels. Theor. Comput. Sci. 306, 223-243(2003)
-
(2003)
Theor. Comput. Sci.
, vol.306
, pp. 223-243
-
-
De Bonis, A.1
Vaccaro, U.2
-
7
-
-
0000867507
-
Minimum disclosure proofs of knowledge
-
Brassard, G., Chaum, D., Crépeau, C.: Minimum disclosure proofs of knowledge. J. Comput. Syst. Sci. 37, 156-189(1988)
-
(1988)
J. Comput. Syst. Sci.
, vol.37
, pp. 156-189
-
-
Brassard, G.1
Chaum, D.2
Crépeau, C.3
-
8
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: Proceedings of the 42nd Annual IEEE Symposium on Foundations of Computer Science (FOCS 2001), pp. 136-145(2001), Updated Version at http://eprint.iacr.org/2000/067 (Pubitemid 33068374)
-
(2001)
Annual Symposium on Foundations of Computer Science - Proceedings
, pp. 136-145
-
-
Canetti, R.1
-
10
-
-
85030121757
-
Equivalence between two flavours of oblivious transfers
-
Pomerance, C. ed., Springer, Heidelberg
-
Crépeau, C.: Equivalence Between Two Flavours of Oblivious Transfers. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 350-354. Springer, Heidelberg (1988)
-
(1988)
CRYPTO 1987. LNCS
, vol.293
, pp. 350-354
-
-
Crépeau, C.1
-
11
-
-
0010074899
-
Efficient cryptographic protocols based on noisy channels
-
Advances in Cryptology - Eurocrypt '97
-
Crépeau, C.: Efficient Cryptographic Protocols Based on Noisy Channels. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 306-317. Springer, Heidelberg (1997) (Pubitemid 127067809)
-
(1997)
Lecture Notes in Computer Science
, Issue.1233
, pp. 306-317
-
-
Crepeau, C.1
-
13
-
-
23944515855
-
Efficient unconditional oblivious transfer from almost any noisy channel
-
Security in Communication Networks - 4th International Conference, SCN 2004
-
Crépeau, C., Morozov, K., Wolf, S.: Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 47-59. Springer, Heidelberg (2005) (Pubitemid 41190996)
-
(2005)
Lecture Notes in Computer Science
, vol.3352
, pp. 47-59
-
-
Crepeau, C.1
Morozov, K.2
Wolf, S.3
-
14
-
-
84957649042
-
Committed oblivious transfer and private multi-party computation
-
Coppersmith, D. ed., Springer, Heidelberg
-
Crépeau, C., van de Graaf, J., Tapp, A.: Committed Oblivious Transfer and Private Multi-Party Computation. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 110-123. Springer, Heidelberg (1995)
-
(1995)
CRYPTO 1995. LNCS
, vol.963
, pp. 110-123
-
-
Crépeau, C.1
Van De Graaf, J.2
Tapp, A.3
-
15
-
-
26444482584
-
Unfair noisy channels and oblivious transfer
-
Naor, M. ed., Springer, Heidelberg
-
Damgård, I., Fehr, S., Morozov, K., Salvail, L.: Unfair Noisy Channels and Oblivious Transfer. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 355-373. Springer, Heidelberg (2004)
-
(2004)
TCC 2004. LNCS
, vol.2951
, pp. 355-373
-
-
Damgård, I.1
Fehr, S.2
Morozov, K.3
Salvail, L.4
-
16
-
-
84957697395
-
On the (Im) possibility of basing oblivious transfer and bit commitment on weakened security assumptions
-
Stern, J. ed., Springer, Heidelberg
-
Damgård, I., Kilian, J., Salvail, L.: On the (Im) Possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 56-73. Springer, Heidelberg (1999)
-
(1999)
EUROCRYPT 1999. LNCS
, vol.1592
, pp. 56-73
-
-
Damgård, I.1
Kilian, J.2
Salvail, L.3
-
17
-
-
84957611040
-
Lower bounds for oblivious transfer reductions
-
Stern, J. ed., Springer, Heidelberg
-
Dodis, Y., Micali, S.: Lower Bounds for Oblivious Transfer Reductions. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 42-55. Springer, Heidelberg (1999)
-
(1999)
EUROCRYPT 1999. LNCS
, vol.1592
, pp. 42-55
-
-
Dodis, Y.1
Micali, S.2
-
18
-
-
51249175955
-
Families of finite sets in which no set is covered by the union of r others
-
Erdos, P., Frankl, P., Füredi, Z.: Families of finite sets in which no set is covered by the union of r others. Israel Journal of Mathematics 51 (1-2), 79-89(1985)
-
(1985)
Israel Journal of Mathematics
, vol.51
, Issue.1-2
, pp. 79-89
-
-
Erdos, P.1
Frankl, P.2
Füredi, Z.3
-
19
-
-
0022080529
-
A randomized protocol for signing contracts
-
Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637-647(1985)
-
(1985)
Commun. ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
20
-
-
84976832950
-
Proofs that yield nothing but their validity or all languages in np have zero-knowledge proof systems
-
Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity or all languages in np have zero-knowledge proof systems. J. ACM 38(3), 690-728(1991)
-
(1991)
J. ACM
, vol.38
, Issue.3
, pp. 690-728
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
21
-
-
0021941417
-
The knowledge complexity of interactive proof-systems
-
ACM Press
-
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. In: Proceedings of the 17th Annual ACM Symposium on Theory of Computing (STOC 1985), pp. 291-304. ACM Press (1985)
-
(1985)
Proceedings of the 17th Annual ACM Symposium on Theory of Computing (STOC 1985)
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
23
-
-
40249091385
-
OT-combiners via secure computation
-
Canetti, R. ed., Springer, Heidelberg
-
Harnik, D., Ishai, Y., Kushilevitz, E., Nielsen, J. B.: OT-Combiners Via Secure Computation. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 393-411. Springer, Heidelberg (2008)
-
(2008)
TCC 2008. LNCS
, vol.4948
, pp. 393-411
-
-
Harnik, D.1
Ishai, Y.2
Kushilevitz, E.3
Nielsen, J.B.4
-
24
-
-
80051995536
-
Constant-rate oblivious transfer from noisy channels
-
Rogaway, P. ed., Springer, Heidelberg
-
Ishai, Y., Kushilevitz, E., Ostrovsky, R., Prabhakaran, M., Sahai, A., Wullschleger, J.: Constant-rate Oblivious Transfer from Noisy Channels. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 667-684. Springer, Heidelberg (2011)
-
(2011)
CRYPTO 2011. LNCS
, vol.6841
, pp. 667-684
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Prabhakaran, M.4
Sahai, A.5
Wullschleger, J.6
-
25
-
-
77952379198
-
Extracting correlations
-
Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Extracting correlations. In: Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2009), pp. 261-270(2009)
-
(2009)
Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2009)
, pp. 261-270
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
-
26
-
-
51849102397
-
Founding cryptography on oblivious transfer - Efficiently
-
Wagner, D. ed., Springer, Heidelberg
-
Ishai, Y., Prabhakaran, M., Sahai, A.: Founding Cryptography on Oblivious Transfer - Efficiently. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 572-591. Springer, Heidelberg (2008)
-
(2008)
CRYPTO 2008. LNCS
, vol.5157
, pp. 572-591
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
-
30
-
-
35248894039
-
Unconditionally secure homomorphic pre-distributed commitments
-
Fossorier, M. P. C., Høholdt, T., Poli, A. eds., Springer, Heidelberg
-
Nascimento, A., Otsuka, A., Imai, H., Müller-Quade, J.: Unconditionally Secure Homomorphic Pre-Distributed Commitments. In: Fossorier, M. P. C., Høholdt, T., Poli, A. (eds.) AAECC 2003. LNCS, vol. 2643, pp. 604-604. Springer, Heidelberg (2003)
-
(2003)
AAECC 2003. LNCS
, vol.2643
, pp. 604-604
-
-
Nascimento, A.1
Otsuka, A.2
Imai, H.3
Müller-Quade, J.4
-
31
-
-
18544370561
-
A distribution dependent refinement of Pinsker's inequality
-
DOI 10.1109/TIT.2005.846407
-
Ordentlich, E., Weinberger, M. J.: A distribution dependent refinement of pinsker's inequality. IEEE Transactions on Information Theory 51(5), 1836-1840(2005) (Pubitemid 40654455)
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.5
, pp. 1836-1840
-
-
Ordentlich, E.1
Weinberger, M.J.2
-
33
-
-
82955160911
-
On the efficiency of bit commitment reductions
-
Ranellucci, S., Tapp, A., Winkler, S., Wullschleger, J.: On the efficiency of bit commitment reductions. Cryptology ePrint Archive, Report 2011/324(2011)
-
(2011)
Cryptology EPrint Archive, Report 2011/324
-
-
Ranellucci, S.1
Tapp, A.2
Winkler, S.3
Wullschleger, J.4
-
34
-
-
0000657407
-
Ein Satz über Untermengen einer endlichen Menge
-
Sperner, J.: Ein Satz über Untermengen einer endlichen Menge. Math. Z. 27, 544-548(1928)
-
(1928)
Math. Z.
, vol.27
, pp. 544-548
-
-
Sperner, J.1
-
35
-
-
0000589357
-
Some new bounds for cover-free families
-
Stinson, D. R., Wei, R., Zhu, L.: Some new bounds for cover-free families. J. Combin. Theory A 90, 224-234(1999)
-
(1999)
J. Combin. Theory A
, vol.90
, pp. 224-234
-
-
Stinson, D.R.1
Wei, R.2
Zhu, L.3
-
36
-
-
0001998264
-
Conjugate coding
-
Wiesner, S.: Conjugate coding. SIGACT News 15(1), 78-88(1983)
-
(1983)
SIGACT News
, vol.15
, Issue.1
, pp. 78-88
-
-
Wiesner, S.1
-
37
-
-
77956992510
-
On the efficiency of classical and quantum oblivious transfer reductions
-
Rabin, T. ed., Springer, Heidelberg
-
Winkler, S., Wullschleger, J.: On the Efficiency of Classical and Quantum Oblivious Transfer Reductions. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 707-723. Springer, Heidelberg (2010)
-
(2010)
CRYPTO 2010. LNCS
, vol.6223
, pp. 707-723
-
-
Winkler, S.1
Wullschleger, J.2
-
38
-
-
23944463739
-
Commitment capacity of discrete memoryless channels
-
Winter, A., Nascimento, A. C. A., Imai, H.: Commitment capacity of discrete memoryless channels. In: IMA Int. Conf., pp. 35-51(2003)
-
(2003)
IMA Int. Conf.
, pp. 35-51
-
-
Winter, A.1
Nascimento, A.C.A.2
Imai, H.3
-
39
-
-
33745181204
-
New monotones and lower bounds in unconditional two-party computation
-
Shoup, V. ed., Springer, Heidelberg
-
Wolf, S., Wullschleger, J.: New Monotones and Lower Bounds in Unconditional Two-Party Computation. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 467-477. Springer, Heidelberg (2005)
-
(2005)
CRYPTO 2005. LNCS
, vol.3621
, pp. 467-477
-
-
Wolf, S.1
Wullschleger, J.2
-
40
-
-
38049160265
-
Oblivious-transfer amplification
-
Naor, M. ed., Springer, Heidelberg
-
Wullschleger, J.: Oblivious-Transfer Amplification. In: Naor, M. (ed.) EURO-CRYPT 2007. LNCS, vol. 4515, pp. 555-572. Springer, Heidelberg (2007)
-
(2007)
EURO-CRYPT 2007. LNCS
, vol.4515
, pp. 555-572
-
-
Wullschleger, J.1
-
41
-
-
70350627590
-
Oblivious transfer from weak noisy channels
-
Reingold, O. ed., Springer, Heidelberg
-
Wullschleger, J.: Oblivious Transfer from Weak Noisy Channels. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 332-349. Springer, Heidelberg (2009)
-
(2009)
TCC 2009. LNCS
, vol.5444
, pp. 332-349
-
-
Wullschleger, J.1
|