-
1
-
-
38049082907
-
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Aumann, Y., Lindell, Y.: Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137-156. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 137-156
-
-
Aumann, Y.1
Lindell, Y.2
-
2
-
-
84926094916
-
Incentives in Peer-to-Peer Systems
-
ch. 23. Cambridge University Press
-
Babaioff, M., Chuang, J., Feldman, M.: Incentives in Peer-to-Peer Systems. In: Algorithmic Game Theory, ch. 23. Cambridge University Press (2007)
-
(2007)
Algorithmic Game Theory
-
-
Babaioff, M.1
Chuang, J.2
Feldman, M.3
-
3
-
-
84898960610
-
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In: 20th STOC, pp. 1-10 (1988)
-
(1988)
20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
4
-
-
70350379222
-
Secure Multiparty Computation Goes Live
-
Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg
-
Bogetoft, P., et al.: Secure Multiparty Computation Goes Live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 325-343. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5628
, pp. 325-343
-
-
Bogetoft, P.1
-
5
-
-
57049188348
-
Sharemind: A Framework for Fast Privacy-Preserving Computations
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
-
Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A Framework for Fast Privacy-Preserving Computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192-206. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 192-206
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
6
-
-
0000731055
-
Security and Composition of Multiparty Cryptographic Protocols
-
Canetti, R.: Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology 13(1), 143-202 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
7
-
-
84898947315
-
Multi-party Unconditionally Secure Protocols
-
Chaum, D., Crépeau, C., Damgård, I.: Multi-party Unconditionally Secure Protocols. In: 20th STOC, pp. 11-19 (1988)
-
(1988)
20th STOC
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
8
-
-
0012610677
-
Limits on the Security of Coin Flips when Half the Processors are Faulty
-
Cleve, R.: Limits on the Security of Coin Flips when Half the Processors are Faulty. In: 18th STOC, pp. 364-369 (1986)
-
(1986)
18th STOC
, pp. 364-369
-
-
Cleve, R.1
-
9
-
-
77949608607
-
From Passive to Covert Security at Low Cost
-
Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
-
Damgård, I., Geisler, M., Nielsen, J.B.: From Passive to Covert Security at Low Cost. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 128-145. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5978
, pp. 128-145
-
-
Damgård, I.1
Geisler, M.2
Nielsen, J.B.3
-
10
-
-
33745124039
-
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Damgård, I., Ishai, Y.: Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 378-394. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 378-394
-
-
Damgård, I.1
Ishai, Y.2
-
12
-
-
84926072615
-
Manipulation-Resistant Reputation Systems
-
ch. 27. Cambridge University Press
-
Friedman, E., Resnick, P., Sami, R.: Manipulation-Resistant Reputation Systems. In: Algorithmic Game Theory, ch. 27. Cambridge University Press (2007)
-
(2007)
Algorithmic Game Theory
-
-
Friedman, E.1
Resnick, P.2
Sami, R.3
-
15
-
-
0023545076
-
How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority
-
For details see 14
-
Goldreich, O., Micali, S., Wigderson, A.: How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In: 19th STOC, pp. 218-229 (1987), For details see [14]
-
(1987)
19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
16
-
-
44449160882
-
Efficient Two Party and Multi Party Computation Against Covert Adversaries
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
Goyal, V., Mohassel, P., Smith, A.: Efficient Two Party and Multi Party Computation Against Covert Adversaries. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 289-306. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 289-306
-
-
Goyal, V.1
Mohassel, P.2
Smith, A.3
-
17
-
-
80051976682
-
Secure Computation on the Web: Computing without Simultaneous Interaction
-
Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
-
Halevi, S., Lindell, Y., Pinkas, B.: Secure Computation on the Web: Computing without Simultaneous Interaction. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 132-150. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 132-150
-
-
Halevi, S.1
Lindell, Y.2
Pinkas, B.3
-
18
-
-
79952946379
-
On Achieving the "Best of BothWorlds" in Secure Multiparty Computation
-
Ishai, Y., Katz, J., Kushilevitz, E., Lindell, Y., Petrank, E.: On Achieving the "Best of BothWorlds" in Secure Multiparty Computation. SIAM J. Comput. 40(1), 122-141 (2011)
-
(2011)
SIAM J. Comput.
, vol.40
, Issue.1
, pp. 122-141
-
-
Ishai, Y.1
Katz, J.2
Kushilevitz, E.3
Lindell, Y.4
Petrank, E.5
-
19
-
-
84947403595
-
Probability Inequalities for Sums of Bounded Random Variables
-
Hoeffding, W.: Probability Inequalities for Sums of Bounded Random Variables. Journal of the American Statistical Association 58(301), 13-30 (1963)
-
(1963)
Journal of the American Statistical Association
, vol.58
, Issue.301
, pp. 13-30
-
-
Hoeffding, W.1
-
21
-
-
0024859552
-
Verifiable Secret Sharing and Multi-party Protocols with Honest Majority
-
Rabin, T., Ben-Or, M.: Verifiable Secret Sharing and Multi-party Protocols with Honest Majority. In: 21st STOC, pp. 73-85 (1989)
-
(1989)
21st STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
|