메뉴 건너뛰기




Volumn 7785 LNCS, Issue , 2013, Pages 243-262

A full characterization of functions that imply fair coin tossing and ramifications to fairness

Author keywords

[No Author keywords available]

Indexed keywords

COIN-TOSSING; FINITE DOMAINS; IMPOSSIBILITY RESULTS;

EID: 84873977107     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-36594-2_14     Document Type: Conference Paper
Times cited : (20)

References (13)
  • 1
    • 84873946513 scopus 로고    scopus 로고
    • Full version of this work
    • Full version of this work. Cryptology ePrint Archive (2013)
    • (2013) Cryptology ePrint Archive
  • 2
    • 84898960610 scopus 로고
    • Completeness theorems for noncryptographic fault-tolerant distributed computation
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation. In: 20th STOC, pp. 1-10 (1988)
    • (1988) 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 3
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 143-202 (2000)
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 4
    • 84957671573 scopus 로고
    • Multiparty unconditionally secure protocols
    • Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols. In: The 20th STOC, pp. 1-10 (1988)
    • (1988) The 20th STOC , pp. 1-10
    • Chaum, D.1    Crépeau, C.2    Damgård, I.3
  • 5
    • 0012610677 scopus 로고
    • Limits on the security of coin flips when half the processors are faulty
    • extended abstract
    • Cleve, R.: Limits on the security of coin flips when half the processors are faulty (extended abstract). In: The 18th STOC, pp. 364-369 (1986)
    • (1986) The 18th STOC , pp. 364-369
    • Cleve, R.1
  • 6
    • 33645593031 scopus 로고    scopus 로고
    • The Foundations of Cryptography
    • Cambridge University Press
    • Goldreich, O.: The Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press (2004)
    • (2004) Basic Applications , vol.2
    • Goldreich, O.1
  • 7
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
    • Goldreich, O., Micali, S.,Wigderson, A.: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. JACM 38(1), 691-729 (1991)
    • (1991) JACM , vol.38 , Issue.1 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 8
    • 0023545076 scopus 로고
    • How to play any mental game or a completeness theorem for protocols with honest majority
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: The 19th STOC, pp. 218-229 (1987)
    • (1987) The 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 9
    • 84855248474 scopus 로고    scopus 로고
    • Complete fairness in secure two-party computation
    • Gordon, S.D., Hazay, C., Katz, J., Lindell, Y.: Complete fairness in secure two-party computation. JACM 58(6), 24 (2011)
    • (2011) JACM , vol.58 , Issue.6 , pp. 24
    • Gordon, S.D.1    Hazay, C.2    Katz, J.3    Lindell, Y.4
  • 10
    • 4544353942 scopus 로고
    • A general completeness theorem for two-party games
    • Kilian, J.: A general completeness theorem for two-party games. In: 23rd STOC, pp. 553-560 (1991)
    • (1991) 23rd STOC , pp. 553-560
    • Kilian, J.1
  • 11
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: The 21st STOC, pp. 73-85 (1989)
    • (1989) The 21st STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 13
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • extended abstract
    • Yao, A.: How to generate and exchange secrets (extended abstract). In: The 27th FOCS, pp. 162-167 (1986)
    • (1986) The 27th FOCS , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.