-
1
-
-
0024940038
-
Non-cryptographic fault-tolerant computing in a constant number of rounds
-
ACM
-
J. Bar-Ilan and D. Beaver. Non-cryptographic fault-tolerant computing in a constant number of rounds. In Proc. 8th ACM PODC, pages 201–209. ACM, 1989.
-
(1989)
Proc
, pp. 201-209
-
-
Bar-Ilan, J.1
Beaver, D.2
-
2
-
-
84948952992
-
Minimal-Latency Secure Function Evaluation
-
D. Beaver. Minimal-Latency Secure Function Evaluation. In Eurocrypt ’00, pages 335–350, 2000. LNCS No. 1807.
-
(2000)
Eurocrypt ’00
, Issue.1807
, pp. 335-350
-
-
Beaver, D.1
-
4
-
-
0025137207
-
The round complexity of secure protocols (Extended abstract)
-
D. Beaver, S. Micali, and P. Rogaway. The round complexity of secure protocols (extended abstract). In Proc. 22nd STOC, pages 503–513. ACM, 1990.
-
(1990)
Proc
, pp. 503-513
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
5
-
-
84898960610
-
Completeness Theorems for Noncryptographic Fault-Tolerant Distributed Computations
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness Theorems for Noncryptographic Fault-Tolerant Distributed Computations. Proc. 20th STOC88, pp. 1–10.
-
Proc
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
7
-
-
0003661492
-
Bit Optimal Distributed Consensus
-
R. Yaeza-Bates and U. Manber, editors, Plenum Publishing Corporation
-
P. Berman, J. Garay, and K. Perry. Bit Optimal Distributed Consensus. In R. Yaeza-Bates and U. Manber, editors, Computer Science Research, pages 313–322. Plenum Publishing Corporation, 1992.
-
(1992)
Computer Science Research
, pp. 313-322
-
-
Berman, P.1
Garay, J.2
Perry, K.3
-
9
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143–202, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
10
-
-
84898947315
-
Multiparty Unconditionally Secure Protocols
-
D. Chaum, C. Crepeau, and I. Damgard. Multiparty Unconditionally Secure Protocols. In Proc. 20th STOC88, pages 11–19.
-
Proc
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
11
-
-
84870398909
-
Secure distributed linear algebra in a constant number of rounds
-
R. Cramer and I. Damgård. Secure distributed linear algebra in a constant number of rounds. In Proc. Crypto 2001.
-
Proc. Crypto 2001
-
-
Cramer, R.1
Damgård, I.2
-
12
-
-
84957717648
-
Efficient multiparty computations with dishonest minority
-
LNCS
-
R. Cramer, I. Damgård, S. Dziembowski, M. Hirt, and T. Rabin. Efficient multiparty computations with dishonest minority. In Eurocrypt ’99, pages 311–326, 1999. LNCS No. 1592.
-
(1999)
Eurocrypt ’99
, Issue.1592
, pp. 311-326
-
-
Cramer, R.1
Damgård, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
13
-
-
0027986369
-
A minimal model for secure computation (Extended abstract)
-
ACM
-
Uri Feige, Joe Kilian, and Moni Naor. A minimal model for secure computation (extended abstract). In Proc. 26th STOC, pages 554–563. ACM, 1994.
-
(1994)
Proc
, pp. 554-563
-
-
Feige, U.1
Kilian, J.2
Naor, M.3
-
14
-
-
0031210863
-
An Optimal Algorithm for Synchronous Byzantine Agreement
-
P. Feldman and S. Micali. An Optimal Algorithm for Synchronous Byzantine Agreement. SIAM. J. Computing, 26(2):873–933, 1997.
-
(1997)
SIAM
, vol.26
, Issue.2
, pp. 873-933
-
-
Feldman, P.1
Micali, S.2
-
17
-
-
33745155959
-
The Round Complexity of Verifiable Secret Sharing and Secure Multicast
-
R. Gennaro, Y. Ishai, E. Kushilevitz, and T. Rabin. The Round Complexity of Verifiable Secret Sharing and Secure Multicast. In Proc. 33th STOC. ACM, 2001.
-
(2001)
Proc
-
-
Gennaro, R.1
Ishai, Y.2
Kushilevitz, E.3
Rabin, T.4
-
18
-
-
0029181976
-
Achieving Independence Efficiently and Securely
-
Rosario Gennaro. Achieving Independence Efficiently and Securely. In Proc. 14th ACM PODC, pages 130–136. ACM, 1995.
-
(1995)
Proc
, pp. 130-136
-
-
Gennaro, R.1
-
21
-
-
0023545076
-
How to Play Any Mental Game
-
O. Goldreich, S. Micali, and A. Wigderson. How to Play Any Mental Game. In Proc. 19th STOC, pages 218–229. ACM, 1987.
-
(1987)
Proc
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
22
-
-
0030718794
-
Private simultaneous messages protocols with applications
-
Y. Ishai and E. Kushilevitz. Private simultaneous messages protocols with applications. In ISTCS97, pages 174–184, 1997.
-
(1997)
ISTCS97
, pp. 174-184
-
-
Ishai, Y.1
Kushilevitz, E.2
-
23
-
-
33745854210
-
Randomizing polynomials: A new representation with applications to round-efficient secure computation
-
Y. Ishai and E. Kushilevitz. Randomizing polynomials: A new representation with applications to round-efficient secure computation. In Proc. 41st FOCS, 2000.
-
(2000)
Proc
-
-
Ishai, Y.1
Kushilevitz, E.2
-
24
-
-
17744373926
-
Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials
-
Y. Ishai and E. Kushilevitz. Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials. In Proc. ICALP ’02.
-
Proc. ICALP ’02
-
-
Ishai, Y.1
Kushilevitz, E.2
-
25
-
-
84976699318
-
The Byzantine generals problem
-
L. Lamport, R.E. Shostack, and M. Pease. The Byzantine generals problem. ACM Trans. Prog. Lang. and Systems, 4(3):382–401, 1982.
-
(1982)
ACM Trans. Prog. Lang. and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostack, R.E.2
Pease, M.3
-
26
-
-
35048833033
-
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
-
Y. Lindell. Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. In Crypto ’01, pages 171–189, 2001. LNCS No. 2139.
-
(2001)
Crypto ’01
, Issue.2139
, pp. 171-189
-
-
Lindell, Y.1
-
28
-
-
85027164480
-
How to withstand mobile virus attacks
-
R. Ostrovsky and M. Yung. How to withstand mobile virus attacks. In Proc. 10th ACM PODC, pages 51–59. ACM, 1991.
-
(1991)
Proc
, pp. 51-59
-
-
Ostrovsky, R.1
Yung, M.2
-
29
-
-
84976810569
-
Reaching Agreement in the Presence of Faults
-
M. Pease, R. Shostak, and L. Lamport. Reaching Agreement in the Presence of Faults. Journal of the ACM, 27(2):228–234, 1980.
-
(1980)
Journal of the ACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
30
-
-
0024859552
-
Verifiable Secret Sharing and Multiparty Protocols with Honest Majority
-
T. Rabin and M. Ben-Or. Verifiable Secret Sharing and Multiparty Protocols with Honest Majority. In Proc. 21st STOC, pages 73–85. ACM, 1989.
-
(1989)
Proc
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
31
-
-
0033309271
-
Non-Interactive CryptoComputing For NC1
-
T. Sander, A. Young, and M. Yung. Non-Interactive CryptoComputing For NC1. In Proc. 40th FOCS, pages 554–567. IEEE, 1999.
-
(1999)
Proc
, pp. 554-567
-
-
Sander, T.1
Young, A.2
Yung, M.3
-
32
-
-
0022882770
-
How to Generate and Exchange Secrets
-
A. C-C. Yao. How to Generate and Exchange Secrets. In Proc. 27th FOCS, pages 162–167. IEEE, 1986.
-
(1986)
Proc
, pp. 162-167
-
-
Yao, A.C.1
|