-
2
-
-
0002382799
-
Foundation of Secure Interactive Computation
-
D. Beaver, Foundation of Secure Interactive Computation, Advances in Cryptology-Crypto’91, pp. 377–391, 1991.
-
(1991)
Advances in Cryptology-Crypto’91
, pp. 377-391
-
-
Beaver, D.1
-
3
-
-
0030679850
-
Commodity-Based Cryptography
-
D. Beaver, “Commodity-Based Cryptography”, STOC 1997, pp. 446-455.
-
(1997)
STOC
, pp. 446-455
-
-
Beaver, D.1
-
4
-
-
0001870201
-
Locally Random Reductions: Improvements and Applications
-
D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. “Locally Random Reductions: Improvements and Applications”, Journal of Cryptology 10(1): 17-36 (1997).
-
(1997)
Journal of Cryptology
, vol.10
, Issue.1
, pp. 17-36
-
-
Beaver, D.1
Feigenbaum, J.2
Kilian, J.3
Rogaway, P.4
-
6
-
-
0022864717
-
Information Theoretic Reduction Among Disclosure Problems
-
G. Brassard, C. Crépeau and J.-M. Robert Information Theoretic Reduction Among Disclosure Problems, 27th FOCS, pp. 168–173, 1986.
-
(1986)
27th FOCS
, pp. 168-173
-
-
Brassard, G.1
Crépeau, C.2
Robert, J.-M.3
-
7
-
-
84888252697
-
All-or-Nothing Disclosure of Secrets
-
Springer
-
G. Brassard, C. Crépeau and J.-M. Robert, All-or-Nothing Disclosure of Secrets, Advances in Cryptology-Crypto’86, LNCS 263, Springer, pp. 234–238, 1987.
-
(1987)
Advances in Cryptology-Crypto’86, LNCS
, vol.263
, pp. 234-238
-
-
Brassard, G.1
Crépeau, C.2
Robert, J.-M.3
-
8
-
-
0030283655
-
Oblivious Transfer and Intersecting Codes
-
G. Brassard, C. Crépeau and M. Santha, Oblivious Transfer and Intersecting Codes, IEEE Trans. on Inform. Theory, Vol. 42(6), pp. 1769–1780, 1996.
-
(1996)
IEEE Trans. On Inform. Theory
, vol.42
, Issue.6
, pp. 1769-1780
-
-
Brassard, G.1
Crépeau, C.2
Santha, M.3
-
9
-
-
84957712978
-
On the foundations of oblivious transfer
-
Springer
-
C. Cachin, On the foundations of oblivious transfer, Advances in Cryptology-Eurocrypt’98, LNCS 1403, pp. 361-374. Springer, 1998.
-
(1998)
Advances in Cryptology-Eurocrypt’98, LNCS
, vol.1403
, pp. 361-374
-
-
Cachin, C.1
-
10
-
-
0032201622
-
Private Information Retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz and M. Sudan, Private Information Retrieval, J. of ACM 45(6), 1998, pp. 965–981.
-
(1998)
J. Of ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
11
-
-
85030121757
-
Equivalence between two flavors of oblivious transfers
-
C. Crépeau, Equivalence between two flavors of oblivious transfers, Advances in Cryptology–Crypto’87, LNCS 293, pp. 350–354, 1988.
-
(1988)
Advances in Cryptology–Crypto’87, LNCS
, vol.293
, pp. 350-354
-
-
Crépeau, C.1
-
12
-
-
0024132071
-
Achieving oblivious transfer using weakened security assumptions
-
C. Crépeau and J. Kilian, Achieving oblivious transfer using weakened security assumptions, FOCS’88, pp. 42–52, 1988.
-
(1988)
FOCS’88
, pp. 42-52
-
-
Crépeau, C.1
Kilian, J.2
-
13
-
-
0022080529
-
A Randomized Protocol for Signing Contracts
-
S. Even, O. Goldreich and A. Lempel, A Randomized Protocol for Signing Contracts, Communications of the ACM 28, pp. 637–647, 1985.
-
(1985)
Communications of the ACM
, vol.28
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
14
-
-
84937574654
-
A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication
-
Springer
-
Y. Gertner, S. Goldwasser, T. Malkin, A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication,. RANDOM 1998, LNCS 1518, Springer, pp. 200–217.
-
RANDOM 1998, LNCS 1518
, pp. 200-217
-
-
Gertner, Y.1
Goldwasser, S.2
Malkin, T.3
-
15
-
-
0031624875
-
Protecting Data Privacy in Private Information Retrieval Schemes
-
Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin, Protecting Data Privacy in Private Information Retrieval Schemes, Proc. 30th STOC 1998, pp. 151–160.
-
(1998)
Proc. 30th STOC
, pp. 151-160
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
17
-
-
85032194875
-
How to Solve any Protocol Problem-An Efficiency Improvement
-
O. Goldreich and R. Vainish, How to Solve any Protocol Problem-An Efficiency Improvement, Advances in Cryptology-Crypto’87, LNCS 293, 1988, pp. 73–86.
-
(1988)
Advances in Cryptology-Crypto’87, LNCS
, vol.293
, pp. 73-86
-
-
Goldreich, O.1
Vainish, R.2
-
18
-
-
0024866742
-
Limits on the Provable Consequences of One-Way Permutations
-
R. Impagliazzo and S. Rudich, Limits on the Provable Consequences of One-Way Permutations, STOC’89, pp. 44–61, 1989.
-
(1989)
STOC’89
, pp. 44-61
-
-
Impagliazzo, R.1
Rudich, S.2
-
24
-
-
84937483935
-
-
Unconditionally Secure Commitment and Oblivious Transfer Schemes Using Private Channels and a Trusted Initializer, manuscript
-
R. Rivest, Unconditionally Secure Commitment and Oblivious Transfer Schemes Using Private Channels and a Trusted Initializer, manuscript. Available: http://theory.lcs.mit.edu/~rivest/publications.html
-
-
-
Rivest, R.1
|