-
1
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computing
-
ACM Press
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic fault-tolerant distributed computing. In: Proc. ACM STOC, ’88, pages 1–10, ACM Press, 1988.
-
(1988)
Proc. ACM STOC, ’88
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
2
-
-
84898947315
-
Multiparty unconditional secure protocols
-
ACM Press
-
D. Chaum, C. Crepeau, and I. Damgard. Multiparty unconditional secure protocols. In: Proc. ACM STOC ’88, pages 11–19, ACM Press, 1988.
-
(1988)
Proc. ACM STOC ’88
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
3
-
-
0009768331
-
The Byzantine generals strike again
-
D. Dolev. The Byzantine generals strike again. J. of Algorithms, 3:14–30, 1982.
-
(1982)
J of Algorithms
, vol.3
, pp. 14-30
-
-
Dolev, D.1
-
4
-
-
0027341860
-
Perfectly secure message transmission
-
D. Dolev, C. Dwork, O. Waarts, and M. Yung. Perfectly secure message transmission. J. of the ACM, 40(1):17–47, 1993.
-
(1993)
J of the ACM
, vol.40
, Issue.1
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
6
-
-
0003640244
-
Secure communication in minimal connectivity models
-
M. Franklin and R.Wright. Secure communication in minimal connectivity models. Journal of Cryptology, 13(1):9–30, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 9-30
-
-
Franklin, M.1
-
7
-
-
1142282324
-
Secure hypergraphs: Privacy from partial broadcast
-
ACM Press
-
M. Franklin and M. Yung. Secure hypergraphs: privacy from partial broadcast. In: Proc. ACM STOC ’95, pages 36–44, ACM Press, 1995.
-
(1995)
Proc. ACM STOC ’95
, pp. 36-44
-
-
Franklin, M.1
Yung, M.2
-
8
-
-
0016038540
-
Codes which detect deception
-
E. Gilbert, F. MacWilliams, and N. Sloane. Codes which detect deception. The BELL System Technical Journal, 53(3):405–424, 1974.
-
(1974)
The BELL System Technical Journal
, vol.53
, Issue.3
, pp. 405-424
-
-
Gilbert, E.1
Macwilliams, F.2
Sloane, N.3
-
9
-
-
1542674248
-
Fault-tolerant computation in the full information model
-
O. Goldreich, S. Goldwasser, and N. Linial. Fault-tolerant computation in the full information model. SIAM J. Comput. 27(2):506–544, 1998.
-
(1998)
SIAM J. Comput
, vol.27
, Issue.2
, pp. 506-544
-
-
Goldreich, O.1
Goldwasser, S.2
Linial, N.3
-
12
-
-
0019608784
-
On sharing secrets and Reed-Solomon codes
-
September
-
R. J. McEliece and D. V. Sarwate. On sharing secrets and Reed-Solomon codes. Comm. ACM, 24(9):583–584, September 1981.
-
(1981)
Comm. ACM
, vol.24
, Issue.9
, pp. 583-584
-
-
McEliece, R.J.1
Sarwate, D.V.2
-
13
-
-
0028542745
-
Robust sharing of secrets when the dealer is honest or faulty
-
T. Rabin. Robust sharing of secrets when the dealer is honest or faulty. J. of the ACM, 41(6):1089–1109, 1994.
-
(1994)
J of the ACM
, vol.41
, Issue.6
, pp. 1089-1109
-
-
Rabin, T.1
-
14
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
ACM Press
-
T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In: Proc. ACM STOC ’89, pages 73–85, ACM Press, 1989.
-
(1989)
Proc. ACM STOC ’89
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
15
-
-
1142270158
-
Secure communication in multicast channels: The answer to Franklin and Wright’s question
-
Y. Wang and Y. Desmedt. Secure communication in multicast channels: the answer to Franklin and Wright’s question. J. of Cryptology, 14(2):121–135, 2001.
-
(2001)
J of Cryptology
, vol.14
, Issue.2
, pp. 121-135
-
-
Wang, Y.1
Desmedt, Y.2
|