-
1
-
-
73849126104
-
Security against covert adversaries: Efficient protocols for realistic adversaries
-
Y. Aumann, Y. Lindell, Security against covert adversaries: Efficient protocols for realistic adversaries. J. Cryptol. 23(2), 281-343 (2010)
-
(2010)
J. Cryptol.
, vol.23
, Issue.2
, pp. 281-343
-
-
Aumann, Y.1
Lindell, Y.2
-
2
-
-
85029542707
-
Foundations of secure interactive computing
-
Springer, Berlin
-
D. Beaver, Foundations of secure interactive computing, in CRYPTO'91. LNCS, vol. 576(Springer, Berlin, 1991), pp. 377-391
-
(1991)
CRYPTO'91. LNCS
, vol.576
, pp. 377-391
-
-
Beaver, D.1
-
3
-
-
0000731055
-
Security and composition of multi-party cryptographic protocols
-
R. Canetti, Security and composition of multi-party cryptographic protocols. J. Cryptol. 13(1), 143-202 (2000)
-
(2000)
J. Cryptol.
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
4
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti, Universally composable security: A new paradigm for cryptographic protocols, in 42nd FOCS (2001), pp. 136-145. Full version available at http://eprint.iacr.org/2000/067
-
(2001)
42nd FOCS
, pp. 136-145
-
-
Canetti, R.1
-
5
-
-
84880897758
-
Universally composable commitments
-
Springer, Berlin
-
R. Canetti, M. Fischlin, Universally composable commitments, in CRYPTO 2001. LNCS, vol. 2139(Springer, Berlin, 2001), pp. 19-40
-
(2001)
CRYPTO 2001. LNCS
, vol.2139
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
6
-
-
0018456171
-
Universal classes of Hash functions
-
L. Carter, M. N. Wegman, Universal classes of Hash functions. J. Comput. Syst. Sci. 18(2), 143-154 (1979)
-
(1979)
J. Comput. Syst. Sci.
, vol.18
, Issue.2
, pp. 143-154
-
-
Carter, L.1
Wegman, M.N.2
-
7
-
-
85016672373
-
Proofs of partial knowledge and simplified design of Witness hiding protocols
-
Springer, Berlin
-
R. Cramer, I. Damgård, B. Schoenmakers, Proofs of partial knowledge and simplified design of Witness hiding protocols, in CRYPTO'94. LNCS, vol. 839(Springer, Berlin, 1994), pp. 174-187
-
(1994)
CRYPTO'94. LNCS
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
9
-
-
35048839833
-
Randomness extraction and key derivation using the CBC, cascade and HMAC modes
-
Springer, Berlin
-
Y. Dodis, R. Gennaro, J. Hastad, H. Krawczyk, T. Rabin, Randomness extraction and key derivation using the CBC, cascade and HMAC modes, in CRYPTO 2004. LNCS, vol. 3152(Springer, Berlin, 2004), pp. 494-510
-
(2004)
CRYPTO 2004. LNCS
, vol.3152
, pp. 494-510
-
-
Dodis, Y.1
Gennaro, R.2
Hastad, J.3
Krawczyk, H.4
Rabin, T.5
-
10
-
-
51849131499
-
Efficient constructions of composable commitments and zero-knowledge proofs
-
Springer, Berlin
-
Y. Dodis, V. Shoup, S. Walfish, Efficient constructions of composable commitments and zero-knowledge proofs, in CRYPTO 2008. LNCS, vol. 5157(Springer, Berlin, 2008), pp. 515-535
-
(2008)
CRYPTO 2008. LNCS
, vol.5157
, pp. 515-535
-
-
Dodis, Y.1
Shoup, V.2
Walfish, S.3
-
11
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, A. Lempel, A randomized protocol for signing contracts. Commun. ACM 28(6), 637-647 (1985)
-
(1985)
Commun. ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
12
-
-
35248886595
-
Strengthening zero-knowledge protocols using signatures
-
Springer, Berlin
-
J. Garay, P. MacKenzie, K. Yang. Strengthening zero-knowledge protocols using signatures, in EUROCRYPT 2003. LNCS, vol. 2656(Springer, Berlin, 2003), pp. 177-194
-
(2003)
EUROCRYPT 2003. LNCS
, vol.2656
, pp. 177-194
-
-
Garay, J.1
MacKenzie, P.2
Yang, K.3
-
14
-
-
0023545076
-
How to play any mental game-A completeness theorem for protocols with honest majority
-
Chap. 7
-
O. Goldreich, S. Micali, A. Wigderson, How to play any mental game-A completeness theorem for protocols with honest majority, in 19th STOC (1987), pp. 218-229. For details see [13, Chap. 7]
-
(1987)
19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
15
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
Spring, Berlin
-
S. Goldwasser, L. Levin, Fair computation of general functions in presence of immoral majority, in CRYPTO'90. LNCS, vol. 537(Spring, Berlin, 1990), pp. 77-93
-
(1990)
CRYPTO'90. LNCS
, vol.537
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
16
-
-
44449160882
-
Efficient two party and multi party computation against covert adversaries
-
Springer, Berlin
-
V. Goyal, P. Mohassel, A. Smith. Efficient two party and multi party computation against covert adversaries, in EUROCRYPT2008. LNCS, vol. 4965(Springer, Berlin, 2008), pp. 289-306
-
(2008)
EUROCRYPT2008. LNCS
, vol.4965
, pp. 289-306
-
-
Goyal, V.1
Mohassel, P.2
Smith, A.3
-
17
-
-
0004030358
-
-
2nd edn. Addison-Wesley, Reading
-
R. L. Graham, D. E. Knuth, O. Patashnik, Concrete Mathematics: A Foundation for Computer Science, 2nd edn. (Addison-Wesley, Reading, 1998)
-
(1998)
Concrete Mathematics: A Foundation for Computer Science
-
-
Graham, R.L.1
Knuth, D.E.2
Patashnik, O.3
-
18
-
-
0345253860
-
Construction of a pseudo-random generator from any one-way function
-
J. Hastad, R. Impagliazzo, L. Levin, M. Luby, Construction of a pseudo-random generator from any one-way function. SIAM J. Comput. 28(4), 1364-1396 (1999)
-
(1999)
SIAM J. Comput.
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
20
-
-
79955547393
-
Efficient set operations in the presence of malicious adversaries
-
Springer, Berlin
-
C. Hazay, K. Nissim, Efficient set operations in the presence of malicious adversaries, in PKC 2010. LNCS, vol. 6056(Springer, Berlin, 2010), pp. 312-331
-
(2010)
PKC 2010. LNCS
, vol.6056
, pp. 312-331
-
-
Hazay, C.1
Nissim, K.2
-
21
-
-
51849102397
-
Founding cryptography on oblivious transfer-Efficiently
-
Springer, Berlin
-
Y. Ishai, M. Prabhakaran, A. Sahai, Founding cryptography on oblivious transfer-Efficiently, in CRYPTO 2008. LNCS, vol. 5157(Springer, Berlin, 2008), pp. 572-591
-
(2008)
CRYPTO 2008. LNCS
, vol.5157
, pp. 572-591
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
-
22
-
-
70350677017
-
Secure arithmetic computation with no honest majority
-
Springer, Berlin
-
Y. Ishai, M. Prabhakaran, A. Sahai, Secure arithmetic computation with no honest majority, in TCC 2009. LNCS, vol. 5444(Springer, Berlin, 2009), pp. 294-314
-
(2009)
TCC 2009. LNCS
, vol.5444
, pp. 294-314
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
-
23
-
-
38049136533
-
Efficient two-party secure computation on committed inputs
-
Springer, Berlin
-
S. Jarecki, V. Shmatikov, Efficient two-party secure computation on committed inputs, in EUROCRYPT 2007. LNCS, vol. 4515(Springer, Berlin, 2007), pp. 97-114
-
(2007)
EUROCRYPT 2007. LNCS
, vol.4515
, pp. 97-114
-
-
Jarecki, S.1
Shmatikov, V.2
-
25
-
-
49049099825
-
Improved garbled circuit: Free XOR gates and applications
-
Springer, Berlin
-
V. Kolesnikov, T. Schneider, Improved garbled circuit: Free XOR gates and applications, in 35th ICALP. LNCS, vol. 5126(Springer, Berlin, 2008), pp. 486-498
-
(2008)
35th ICALP. LNCS
, vol.5126
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
26
-
-
4544235438
-
Parallel coin-tossing and constant-round secure two-party computation
-
Y. Lindell, Parallel coin-tossing and constant-round secure two-party computation. J. Cryptol. 16(3), 143-184 (2003)
-
(2003)
J. Cryptol.
, vol.16
, Issue.3
, pp. 143-184
-
-
Lindell, Y.1
-
27
-
-
79957976152
-
Highly-efficient universally-composable commitments
-
Springer, Berlin
-
Y. Lindell, Highly-efficient universally-composable commitments, in EUROCRYPT 2011. LNCS, vol. 6632(Springer, Berlin, 2011), pp. 446-466
-
(2011)
EUROCRYPT 2011. LNCS
, vol.6632
, pp. 446-466
-
-
Lindell, Y.1
-
28
-
-
38049136534
-
An efficient protocol for secure two-party computation in the presence of malicious adversaries
-
Springer, Berlin
-
Y. Lindell, B. Pinkas, An efficient protocol for secure two-party computation in the presence of malicious adversaries, in EUROCRYPT2007. LNCS, vol. 4515(Springer, Berlin, 2007), pp. 52-78
-
(2007)
EUROCRYPT2007. LNCS
, vol.4515
, pp. 52-78
-
-
Lindell, Y.1
Pinkas, B.2
-
29
-
-
64249101946
-
A proof of Yao's protocol for secure two-party computation
-
Y. Lindell, B. Pinkas, A proof of Yao's protocol for secure two-party computation. J. Cryptol. 22(2), 161-188 (2009)
-
(2009)
J. Cryptol.
, vol.22
, Issue.2
, pp. 161-188
-
-
Lindell, Y.1
Pinkas, B.2
-
30
-
-
35048882590
-
On simulation-sound trapdoor commitments
-
Springer, Berlin
-
P. MacKenzie, K. Yang, On simulation-sound trapdoor commitments, in EUROCRYPT 2004. LNCS, vol. 3027(Springer, Berlin, 2004), pp. 382-400
-
(2004)
EUROCRYPT 2004. LNCS
, vol.3027
, pp. 382-400
-
-
MacKenzie, P.1
Yang, K.2
-
32
-
-
84974655726
-
Secure computation. Unpublished manuscript, 1992
-
Springer, Berlin
-
S. Micali, P. Rogaway, Secure computation. Unpublished manuscript, 1992. Preliminary version in CRYPTO'91, LNCS, vol. 576(Springer, Berlin, 1991), pp. 392-404
-
(1991)
Preliminary Version in CRYPTO'91, LNCS
, vol.576
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
33
-
-
33745843587
-
Efficiency tradeoffs for malicious two-party computation
-
Springer, Berlin
-
P. Mohassel, M. K. Franklin, Efficiency tradeoffs for malicious two-party computation, in 9th PKC Conference. LNCS, vol. 3958(Springer, Berlin, 2006), pp. 458-473
-
(2006)
9th PKC Conference. LNCS
, vol.3958
, pp. 458-473
-
-
Mohassel, P.1
Franklin, M.K.2
-
34
-
-
0029510686
-
Synthesizers and their application to the parallel construction of pseudo-random functions
-
M. Naor, O. Reingold, Synthesizers and their application to the parallel construction of pseudo-random functions, in 36th FOCS (1995), pp. 170-181
-
(1995)
36th FOCS
, pp. 170-181
-
-
Naor, M.1
Reingold, O.2
-
35
-
-
70350634167
-
LEGO for two-party secure computation
-
Springer, Berlin
-
J. B. Nielsen, C. Orlandi, LEGO for two-party secure computation, in TCC 2009. LNCS, vol. 5444(Springer, Berlin, 2009), pp. 368-386
-
(2009)
TCC 2009. LNCS
, vol.5444
, pp. 368-386
-
-
Nielsen, J.B.1
Orlandi, C.2
-
37
-
-
51849126892
-
A framework for efficient and composable oblivious transfer
-
Springer, Berlin
-
C. Peikert, V. Vaikuntanathan, B. Waters, A framework for efficient and composable oblivious transfer, in CRYPTO'08. LNCS, vol. 5157(Springer, Berlin, 2008), pp. 554-571
-
(2008)
CRYPTO'08. LNCS
, vol.5157
, pp. 554-571
-
-
Peikert, C.1
Vaikuntanathan, V.2
Waters, B.3
-
38
-
-
72449131818
-
Secure two-party computation is practical
-
Springer, Berlin
-
B. Pinkas, T. Schneider, N. P. Smart, S. C. Williams. Secure two-party computation is practical, in ASI-ACRYPT 2009. LNCS, vol. 5912(Springer, Berlin, 2009), pp. 250-267
-
(2009)
ASI-ACRYPT 2009. LNCS
, vol.5912
, pp. 250-267
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.P.3
Williams, S.C.4
-
39
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Aiken Computation Laboratory, Harvard U.
-
M. Rabin, How to exchange secrets by oblivious transfer. Tech. Memo TR-81, Aiken Computation Laboratory, Harvard U., 1981
-
(1981)
Tech. Memo TR-81
-
-
Rabin, M.1
-
40
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret. Commun. ACM 22(11), 612-613 (1979)
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
41
-
-
0022882770
-
How to generate and exchange secrets
-
A. C. Yao, How to generate and exchange secrets, in 27th FOCS (1986), pp. 162-167
-
(1986)
27th FOCS
, pp. 162-167
-
-
Yao, A.C.1
|