-
1
-
-
33748686155
-
Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation
-
Eric Ruppert and Dahlia Malkhi, editors, ACM Press, July
-
Ittai Abraham, Danny Dolev, Rica Gonen, and Joseph Y. Halpern. Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In Eric Ruppert and Dahlia Malkhi, editors, 25th ACM Symposium Annual on Principles of Distributed Computing, pages 53-62. ACM Press, July 2006.
-
(2006)
25th ACM Symposium Annual on Principles of Distributed Computing
, pp. 53-62
-
-
Abraham, I.1
Dolev, D.2
Gonen, R.3
Halpern, J.Y.4
-
2
-
-
84914126216
-
Fair two-party computations via bitcoin deposits
-
accepted to the First Workshop on Bitcoin Research (in Assocation with Financial Crypto), 2013
-
Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, and Łukasz Mazurek. Fair two-party computations via bitcoin deposits. Cryptology ePrint Archive, Report 2013/837, accepted to the First Workshop on Bitcoin Research 2014 (in Assocation with Financial Crypto), 2013. http://eprint.iacr.org/.
-
(2014)
Cryptology EPrint Archive, Report 2013/837
-
-
Andrychowicz, M.1
Dziembowski, S.2
Malinowski, D.3
Mazurek, L.4
-
5
-
-
84865819620
-
Bitter to better - How to make Bitcoin a better currency
-
Angelos D. Keromytis, editor, Springer, February/March
-
Simon Barber, Xavier Boyen, Elaine Shi, and Ersin Uzun. Bitter to better - how to make Bitcoin a better currency. In Angelos D. Keromytis, editor, FC 2012: 16th International Conference on Financial Cryptography and Data Security, volume 7397 of Lecture Notes in Computer Science, pages 399-414. Springer, February/March 2012.
-
(2012)
FC 2012: 16th International Conference on Financial Cryptography and Data Security, Volume 7397 of Lecture Notes in Computer Science
, pp. 399-414
-
-
Barber, S.1
Boyen, X.2
Shi, E.3
Uzun, E.4
-
6
-
-
80051969535
-
1/p-Secure multiparty computation without honest majority and the best of both worlds
-
Phillip Rogaway, editor, Springer, August
-
Amos Beimel, Yehuda Lindell, Eran Omri, and Ilan Orlov. 1/p-Secure multiparty computation without honest majority and the best of both worlds. In Phillip Rogaway, editor, Advances in Cryptology - CRYPTO 2011, volume 6841 of Lecture Notes in Computer Science, pages 277-296. Springer, August 2011.
-
(2011)
Advances in Cryptology - CRYPTO 2011, Volume 6841 of Lecture Notes in Computer Science
, pp. 277-296
-
-
Beimel, A.1
Lindell, Y.2
Omri, E.3
Orlov, I.4
-
7
-
-
70349266254
-
Fairplay MP: A system for secure multi-party computation
-
Peng Ning, Paul F. Syverson, and Somesh Jha, editors, ACM Press, October
-
Assaf Ben-David, Noam Nisan, and Benny Pinkas. Fairplay MP: a system for secure multi-party computation. In Peng Ning, Paul F. Syverson, and Somesh Jha, editors, ACM CCS 08: 15th Conference on Computer and Communications Security, pages 257-266. ACM Press, October 2008.
-
(2008)
ACM CCS 08: 15th Conference on Computer and Communications Security
, pp. 257-266
-
-
Ben-David, A.1
Nisan, N.2
Pinkas, B.3
-
9
-
-
20544431698
-
Coin flipping by telephone
-
In Allen Gersho, editor, volume ECE Report 82-04, U.C. Santa Barbara, Dept. of Elec. and Computer Eng.
-
Manuel Blum. Coin flipping by telephone. In Allen Gersho, editor, Advances in Cryptology - CRYPTO'81, volume ECE Report 82-04, pages 11-15. U.C. Santa Barbara, Dept. of Elec. and Computer Eng., 1981.
-
(1981)
Advances in Cryptology - CRYPTO'81
, pp. 11-15
-
-
Blum, M.1
-
10
-
-
70350379222
-
Secure multiparty computation goes live
-
Roger Dingledine and Philippe Golle, editors, Springer, February
-
Peter Bogetoft, Dan Lund Christensen, Ivan Damgård, Martin Geisler, Thomas Jakobsen, Mikkel Krøigaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, Michael I. Schwartzbach, and Tomas Toft. Secure multiparty computation goes live. In Roger Dingledine and Philippe Golle, editors, FC 2009: 13th International Conference on Financial Cryptography and Data Security, volume 5628 of Lecture Notes in Computer Science, pages 325-343. Springer, February 2009.
-
(2009)
FC 2009: 13th International Conference on Financial Cryptography and Data Security, Volume 5628 of Lecture Notes in Computer Science
, pp. 325-343
-
-
Bogetoft, P.1
Christensen, D.L.2
Damgård, I.3
Geisler, M.4
Jakobsen, T.5
Krøigaard, M.6
Nielsen, J.D.7
Nielsen, J.B.8
Nielsen, K.9
Pagter, J.10
Schwartzbach, M.I.11
Toft, T.12
-
11
-
-
84974588386
-
Timed commitments
-
In Mihir Bellare, editor, Springer, August
-
Dan Boneh and Moni Naor. Timed commitments. In Mihir Bellare, editor, Advances in Cryptology - CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 236-254. Springer, August 2000.
-
(2000)
Advances in Cryptology - CRYPTO 2000, Volume 1880 of Lecture Notes in Computer Science
, pp. 236-254
-
-
Boneh, D.1
Naor, M.2
-
12
-
-
0000867507
-
Minimum disclosure proofs of knowledge
-
Gilles Brassard, David Chaum, and Claude Crepeau. Minimum disclosure proofs of knowledge. Journal of Computer and System Sciences, 37(2):156-189, 1988.
-
(1988)
Journal of Computer and System Sciences
, vol.37
, Issue.2
, pp. 156-189
-
-
Brassard, G.1
Chaum, D.2
Crepeau, C.3
-
15
-
-
84969520105
-
Optimistic fair secure computation
-
Mihir Bellare, editor, Springer, August
-
Christian Cachin and Jan Camenisch. Optimistic fair secure computation. In Mihir Bellare, editor, Advances in Cryptology - CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 93-111. Springer, August 2000.
-
(2000)
Advances in Cryptology - CRYPTO 2000, Volume 1880 of Lecture Notes in Computer Science
, pp. 93-111
-
-
Cachin, C.1
Camenisch, J.2
-
16
-
-
24944435537
-
Compact e-cash
-
Ronald Cramer, editor, Springer, May
-
Jan Camenisch, Susan Hohenberger, and Anna Lysyanskaya. Compact e-cash. In Ronald Cramer, editor, Advances in Cryptology - EUROCRYPT 2005, volume 3494 of Lecture Notes in Computer Science, pages 302-321. Springer, May 2005.
-
(2005)
Advances in Cryptology - EUROCRYPT 2005, Volume 3494 of Lecture Notes in Computer Science
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
17
-
-
0003062028
-
Blind signature system
-
In David Chaum, editor, Plenum Press, New York, USA
-
David Chaum. Blind signature system. In David Chaum, editor, Advances in Cryptology - CRYPTO'83, page 153. Plenum Press, New York, USA, 1983.
-
(1983)
Advances in Cryptology - CRYPTO'83
, pp. 153
-
-
Chaum, D.1
-
18
-
-
0002391080
-
Untraceable electronic cash
-
Shafi Goldwasser, editor, Springer, August
-
David Chaum, Amos Fiat, and Moni Naor. Untraceable electronic cash. In Shafi Goldwasser, editor, Advances in Cryptology - CRYPTO'88, volume 403 of Lecture Notes in Computer Science, pages 319-327. Springer, August 1988.
-
(1988)
Advances in Cryptology - CRYPTO'88, Volume 403 of Lecture Notes in Computer Science
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
19
-
-
84865832159
-
Commit Coin: Carbon dating commitments with Bitcoin - (short paper)
-
Angelos D. Keromytis, editor, Springer, February/March
-
Jeremy Clark and Aleksander Essex. Commit Coin: Carbon dating commitments with Bitcoin - (short paper). In Angelos D. Keromytis, editor, FC 2012: 16th International Conference on Financial Cryptography and Data Security, volume 7397 of Lecture Notes in Computer Science, pages 390-398. Springer, February/March 2012.
-
(2012)
FC 2012: 16th International Conference on Financial Cryptography and Data Security, Volume 7397 of Lecture Notes in Computer Science
, pp. 390-398
-
-
Clark, J.1
Essex, A.2
-
20
-
-
0012610677
-
Limits on the security of coin flips when half the processors are faulty
-
New York, NY, USA, ACM
-
Richard Cleve. Limits on the security of coin flips when half the processors are faulty. In Proceedings of the Eighteenth Annual ACM Symposium on Theory of Computing, STOC '86, pages 364-369, New York, NY, USA, 1986. ACM.
-
(1986)
Proceedings of the Eighteenth Annual ACM Symposium on Theory of Computing, STOC '86
, pp. 364-369
-
-
Cleve, R.1
-
21
-
-
33745119040
-
Merkle-Damgård revisited: How to construct a hash function
-
Victor Shoup, editor, Springer Berlin Heidelberg
-
Jean-Sebastien Coron, Yevgeniy Dodis, Cecile Malinaud, and Prashant Puniya. Merkle-Damgård revisited: How to construct a hash function. In Victor Shoup, editor, Advances in Cryptology - CRYPTO 2005, volume 3621 of Lecture Notes in Computer Science, pages 430-448. Springer Berlin Heidelberg, 2005.
-
(2005)
Advances in Cryptology - CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science
, pp. 430-448
-
-
Coron, J.-S.1
Dodis, Y.2
Malinaud, C.3
Puniya, P.4
-
22
-
-
84884745031
-
Practical covertly secure MPC for dishonest majority - Or: Breaking the SPDZ limits
-
Springer
-
Ivan Damgård, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, and Nigel P. Smart. Practical covertly secure MPC for dishonest majority - or: Breaking the SPDZ limits. In ESORICS 2013: 18th European Symposium on Research in Computer Security, Lecture Notes in Computer Science, pages 1-18. Springer, 2013.
-
(2013)
ESORICS 2013: 18th European Symposium on Research in Computer Security, Lecture Notes in Computer Science
, pp. 1-18
-
-
Damgård, I.1
Keller, M.2
Larraia, E.3
Pastro, V.4
Scholl, P.5
Smart, N.P.6
-
23
-
-
84947273682
-
The sybil attack
-
London, UK, UK, Springer-Verlag
-
John R. Douceur. The sybil attack. In Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01, pages 251-260, London, UK, UK, 2002. Springer-Verlag.
-
(2002)
Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01
, pp. 251-260
-
-
Douceur, J.R.1
-
24
-
-
84943235829
-
Pricing via processing or combatting junk mail
-
Ernest F. Brickell, editor, Springer, August
-
Cynthia Dwork and Moni Naor. Pricing via processing or combatting junk mail. In Ernest F. Brickell, editor, Advances in Cryptology - CRYPTO'92, volume 740 of Lecture Notes in Computer Science, pages 139-147. Springer, August 1992.
-
(1992)
Advances in Cryptology - CRYPTO'92, Volume 740 of Lecture Notes in Computer Science
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
25
-
-
84877607646
-
-
Online gambling: Know when to fold
-
The Economist. Online gambling: Know when to fold, 2013.
-
(2013)
The Economist
-
-
-
27
-
-
84957040406
-
Timed release of standard digital signatures
-
Matt Blaze, editor, Springer, March
-
Juan A. Garay and Markus Jakobsson. Timed release of standard digital signatures. In Matt Blaze, editor, FC 2002: 6th International Conference on Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 168-182. Springer, March 2002.
-
(2002)
FC 2002: 6th International Conference on Financial Cryptography, Volume 2357 of Lecture Notes in Computer Science
, pp. 168-182
-
-
Garay, J.A.1
Jakobsson, M.2
-
28
-
-
84893486709
-
Rational protocol design: Cryptography against incentivedriven adversaries
-
IEEE Computer Society Press
-
Juan A. Garay, Jonathan Katz, Ueli Maurer, Björn Tackmann, and Vassilis Zikas. Rational protocol design: Cryptography against incentivedriven adversaries. In 54th Annual Symposium on Foundations of Computer Science, pages 648-657. IEEE Computer Society Press, 2013.
-
(2013)
54th Annual Symposium on Foundations of Computer Science
, pp. 648-657
-
-
Garay, J.A.1
Katz, J.2
Maurer, U.3
Tackmann, B.4
Zikas, V.5
-
29
-
-
0023545076
-
How to play any mental game or A completeness theorem for protocols with honest majority
-
Alfred Aho, editor, ACM Press, May
-
Oded Goldreich, Silvio Micali, and Avi Wigderson. How to play any mental game or A completeness theorem for protocols with honest majority. In Alfred Aho, editor, 19th Annual ACM Symposium on Theory of Computing, pages 218-229. ACM Press, May 1987.
-
(1987)
19th Annual ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
30
-
-
77954649870
-
Partial fairness in secure twoparty computation
-
Henri Gilbert, editor, Springer, May
-
S. Dov Gordon and Jonathan Katz. Partial fairness in secure twoparty computation. In Henri Gilbert, editor, Advances in Cryptology - EUROCRYPT 2010, volume 6110 of Lecture Notes in Computer Science, pages 157-176. Springer, May 2010.
-
(2010)
Advances in Cryptology - EUROCRYPT 2010, Volume 6110 of Lecture Notes in Computer Science
, pp. 157-176
-
-
Dov Gordon, S.1
Katz, J.2
-
31
-
-
4544259607
-
Rational secret sharing and multiparty computation: Extended abstract
-
László Babai, editor, ACM Press, June
-
Joseph Y. Halpern and Vanessa Teague. Rational secret sharing and multiparty computation: Extended abstract. In László Babai, editor, 36th Annual ACM Symposium on Theory of Computing, pages 623-632. ACM Press, June 2004.
-
(2004)
36th Annual ACM Symposium on Theory of Computing
, pp. 623-632
-
-
Halpern, J.Y.1
Teague, V.2
-
32
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
Berkeley, CA, USA, USENIX Association
-
Dahlia Malkhi, Noam Nisan, Benny Pinkas, and Yaron Sella. Fairplay - a secure two-party computation system. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13, SSYM'04, pages 20-20, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13, SSYM'04
, pp. 20-20
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
33
-
-
84881236275
-
Zerocoin: Anonymous distributed e-cash from bitcoin
-
Washington, DC, USA, IEEE Computer Society
-
Ian Miers, Christina Garman, Matthew Green, and Aviel D. Rubin. Zerocoin: Anonymous distributed e-cash from bitcoin. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP '13, pages 397-411, Washington, DC, USA, 2013. IEEE Computer Society.
-
(2013)
Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP '13
, pp. 397-411
-
-
Miers, I.1
Garman, C.2
Green, M.3
Rubin, A.D.4
-
35
-
-
35248883427
-
Fair secure two-party computation
-
Eli Biham, editor, Springer, May
-
Benny Pinkas. Fair secure two-party computation. In Eli Biham, editor, Advances in Cryptology - EUROCRYPT 2003, volume 2656 of Lecture Notes in Computer Science, pages 87-105. Springer, May 2003.
-
(2003)
Advances in Cryptology - EUROCRYPT 2003, Volume 2656 of Lecture Notes in Computer Science
, pp. 87-105
-
-
Pinkas, B.1
-
36
-
-
0003841024
-
-
Cheating scandals raise new questions about honesty, security of internet gambling, November 30
-
The Washington Post. Cheating scandals raise new questions about honesty, security of internet gambling, November 30, 2008.
-
(2008)
The Washington Post
-
-
-
37
-
-
0002101577
-
Reputation systems
-
December
-
Paul Resnick, Ko Kuwabara, Richard Zeckhauser, and Eric Friedman. Reputation systems. Commun. ACM, 43(12):45-48, December 2000.
-
(2000)
Commun. ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Kuwabara, K.2
Zeckhauser, R.3
Friedman, E.4
-
39
-
-
4544336448
-
-
April. Technical Report, Massachusetts Institute of Technology
-
Adi Shamir, Ron Rivest, and Leonard Adleman. Mental poker, April 1979. Technical Report LCS/TR-125, Massachusetts Institute of Technology.
-
(1979)
Mental Poker
-
-
Shamir, A.1
Rivest, R.2
Adleman, L.3
-
40
-
-
34848898460
-
Covert twoparty computation
-
Harold N. Gabow and Ronald Fagin, editors, ACM Press, May
-
Luis von Ahn, Nicholas J. Hopper, and John Langford. Covert twoparty computation. In Harold N. Gabow and Ronald Fagin, editors, 37th Annual ACM Symposium on Theory of Computing, pages 513-522. ACM Press, May 2005.
-
(2005)
37th Annual ACM Symposium on Theory of Computing
, pp. 513-522
-
-
Von Ahn, L.1
Hopper, N.J.2
Langford, J.3
-
41
-
-
0022882770
-
How to generate and exchange secrets (extended abstract)
-
IEEE Computer Society Press, October
-
Andrew Chi-Chih Yao. How to generate and exchange secrets (extended abstract). In 27th Annual Symposium on Foundations of Computer Science, pages 162-167. IEEE Computer Society Press, October 1986.
-
(1986)
27th Annual Symposium on Foundations of Computer Science
, pp. 162-167
-
-
Yao, A.C.-C.1
|