-
1
-
-
0035166072
-
How to go Beyond the Black-Box Simulation Barrier
-
B. Barak. How to go Beyond the Black-Box Simulation Barrier. In 42nd FOCS, pages 106-115, 2001.
-
(2001)
42nd FOCS
, pp. 106-115
-
-
Barak, B.1
-
2
-
-
0036949106
-
Constant-Round Coin-Tossing or Realizing the Shared-Random String Model
-
B. Barak. Constant-Round Coin-Tossing or Realizing the Shared-Random String Model. In 43rd FOCS, pages 345-355, 2002.
-
(2002)
43rd FOCS
, pp. 345-355
-
-
Barak, B.1
-
3
-
-
0036294828
-
Universal Arguments and their Applications
-
B. Barak and O. Goldreich. Universal Arguments and their Applications. 17th CCC, pages 194-203, 2002.
-
(2002)
17th CCC
, pp. 194-203
-
-
Barak, B.1
Goldreich, O.2
-
4
-
-
0036041101
-
Strict Polynomial-Time in Simulation and Extraction
-
B. Barak and Y. Lindell. Strict Polynomial-Time in Simulation and Extraction. In 34th STOC, pages 484-493, 2002.
-
(2002)
34th STOC
, pp. 484-493
-
-
Barak, B.1
Lindell, Y.2
-
5
-
-
85029542707
-
Foundations of Secure Interactive Computing
-
CRYPTO'91, Springer-Verlag Repetition Lower the Error
-
D. Beaver. Foundations of Secure Interactive Computing. In CRYPTO'91, Springer-Verlag (LNCS 576), pages 377-391, 1991. Repetition Lower the Error
-
(1991)
LNCS
, vol.576
, pp. 377-391
-
-
Beaver, D.1
-
6
-
-
0000731055
-
Security and Composition of Multiparty Cryptographic Protocols
-
R. Canetti. Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology, 13(1):143-202, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
7
-
-
0038721038
-
Universally Composable Security: A New Paradigm for Cryptographic Protocols
-
R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 34th STOC, pages 494-503, 2002.
-
(2002)
34th STOC
, pp. 494-503
-
-
Canetti, R.1
-
8
-
-
84880897758
-
Universally Composable Commitments
-
Crypto2001
-
R. Canetti and M. Fischlin. Universally Composable Commitments. In Crypto2001, Springer LNCS 2139, pages 19-40, 2001.
-
(2001)
Springer LNCS
, vol.2139
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
10
-
-
0037605775
-
Black-Box Concurrent Zero-Knowledge Requires (almost) Logarithmically Many Rounds
-
R. Canetti, J. Kilian, E. Petrank and A. Rosen. Black-Box Concurrent Zero-Knowledge Requires (almost) Logarithmically Many Rounds. SIAM Jour. on Computing, Vol. 32(1), pages 1-47, 2002.
-
(2002)
SIAM Jour. on Computing
, vol.32
, Issue.1
, pp. 1-47
-
-
Canetti, R.1
Kilian, J.2
Petrank, E.3
Rosen, A.4
-
11
-
-
32844458303
-
On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions
-
To appear in
-
R. Canetti, E. Kushilevitz and Y. Lindell. On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions. To appear in EuroCrypt2003.
-
EuroCrypt2003
-
-
Canetti, R.1
Kushilevitz, E.2
Lindell, Y.3
-
12
-
-
0036038991
-
Universally Composable Two-Party and Multy-Party Computation
-
R. Canetti, Y. Lindell, R. Ostrovsky and A. Sahai. Universally Composable Two-Party and Multy-Party Computation. In 34th STOC, pages 494-503,2002.
-
(2002)
34th STOC
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
13
-
-
84948970500
-
Eficient Concurrent Zero-Knowledge in the Auxiliary String Model
-
EuroCrypt2000
-
I. Damgard. Eficient Concurrent Zero-Knowledge in the Auxiliary String Model. In EuroCrypt2000, LNCS 1807, pages 418-430, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 418-430
-
-
Damgard, I.1
-
14
-
-
0343337504
-
Non-Malleable Cryptography
-
D. Dolev, C. Dwork and M. Naor. Non-Malleable Cryptography. SIAM Jour. on Computing, Vol. 30(2), pages 391-437, 2000.
-
(2000)
SIAM Jour. on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
15
-
-
0031632567
-
Concurrent Zero-Knowledge
-
C. Dwork, M. Naor and A. Sahai. Concurrent Zero-Knowledge. In 30th STOC, pages 409-418, 1998.
-
(1998)
30th STOC
, pp. 409-418
-
-
Dwork, C.1
Naor, M.2
Sahai, A.3
-
16
-
-
84957623615
-
Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints
-
Crypto98
-
C. Dwork and A. Sahai. Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints. In Crypto98, Springer LNCS 1462, pages 442-457, 1998.
-
(1998)
Springer LNCS
, vol.1462
, pp. 442-457
-
-
Dwork, C.1
Sahai, A.2
-
20
-
-
0029767165
-
On the Composition of Zero-Knowledge Proof Systems
-
O. Goldreich and H. Krawczyk. On the Composition of Zero-Knowledge Proof Systems. SIAM Jour. on Computing, Vol. 25(1), pages 169-192, 1996.
-
(1996)
SIAM Jour. on Computing
, vol.25
, Issue.1
, pp. 169-192
-
-
Goldreich, O.1
Krawczyk, H.2
-
21
-
-
71149116146
-
Proofs that Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems
-
O. Goldreich, S. Micali and A. Wigderson. Proofs that Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems. JACM, Vol. 38(1), pp. 691-729, 1991.
-
(1991)
JACM
, vol.38
, Issue.1
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
22
-
-
0023545076
-
How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority
-
O. Goldreich, S. Micali and A. Wigderson. How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In 19th STOC, pages 218-229, 1987.
-
(1987)
19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
23
-
-
84955564077
-
Fair Computation of General Functions in Presence of Immoral Majority
-
CRYPTO'90, Springer-Verlag
-
S. Goldwasser and L. Levin. Fair Computation of General Functions in Presence of Immoral Majority. In CRYPTO'90, Springer-Verlag (LNCS 537), pages 77-93, 1990.
-
(1990)
LNCS
, vol.537
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
24
-
-
0034830278
-
Concurrent and Reset-table Zero-Knowledge in Poly-logarithmic Rounds
-
J. Kilian and E. Petrank. Concurrent and Reset-table Zero-Knowledge in Poly-logarithmic Rounds. In 33rd STOC, pages 560-569, 2001.
-
(2001)
33rd STOC
, pp. 560-569
-
-
Kilian, J.1
Petrank, E.2
-
25
-
-
0032319637
-
Lower Bounds for Zero-Knowledge on the Internet
-
J. Kilian, E. Petrank and C. Rackoff. Lower Bounds for Zero-Knowledge on the Internet. In 39th FOCS, pages 484-492, 1998.
-
(1998)
39th FOCS
, pp. 484-492
-
-
Kilian, J.1
Petrank, E.2
Rackoff, C.3
-
26
-
-
0038446804
-
Bounded-Concurrent Secure Two-Party Computation Without Setup Assumptions
-
To appear in
-
Y. Lindell. Bounded-Concurrent Secure Two-Party Computation Without Setup Assumptions. To appear in 34th STOC, 2003.
-
(2003)
34th STOC
-
-
Lindell, Y.1
-
27
-
-
0034854953
-
CS Proofs
-
S. Micali. CS Proofs. SIAM Jour. on Computing, Vol. 30 (4), pages 1253-1298, 2000.
-
(2000)
SIAM Jour. on Computing
, vol.30
, Issue.4
, pp. 1253-1298
-
-
Micali, S.1
-
28
-
-
84974655726
-
Secure computation
-
Unpublished manuscript, Preliminary version in CRYPTO'91, Springer-Verlag
-
S. Micali and P. Rogaway. Secure computation. Unpublished manuscript, 1992. Preliminary version in CRYPTO'91, Springer-Verlag (LNCS 576), pages 392-404, 1991.
-
(1991)
LNCS
, vol.576
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
29
-
-
0001448484
-
Bit Commitment using Pseudorandomness
-
M. Naor. Bit Commitment using Pseudorandomness. Jour. of Cryptology, Vol. 4, pages 151-158, 1991.
-
(1991)
Jour. of Cryptology
, vol.4
, pp. 151-158
-
-
Naor, M.1
-
30
-
-
35248833045
-
Simulation in Quasi-polynomial Time and its Application to Protocol Composition
-
EuroCrypt2003
-
R. Pass. Simulation in Quasi-polynomial Time and its Application to Protocol Composition. In EuroCrypt2003, Springer LNCS 2656, pages 160-176, 2003.
-
(2003)
Springer LNCS
, vol.2656
, pp. 160-176
-
-
Pass, R.1
-
31
-
-
84943423699
-
On Deniability in the Common Reference String and Random Oracle Model
-
To appear in
-
R. Pass. On Deniability in the Common Reference String and Random Oracle Model. To appear in Crypto2003
-
Crypto2003
-
-
Pass, R.1
-
33
-
-
84957621865
-
On the Concurrent Composition of Zero-Knowledge Proofs
-
EuroCrypt99
-
R. Richardson and J. Kilian. On the Concurrent Composition of Zero-Knowledge Proofs. In EuroCrypt99, Springer LNCS 1592, pages 415-431, 1999.
-
(1999)
Springer LNCS
, vol.1592
, pp. 415-431
-
-
Richardson, R.1
Kilian, J.2
-
34
-
-
84983126760
-
A note on the round-complexity of Concurrent Zero-Knowledge
-
Crypto2000
-
A. Rosen. A note on the round-complexity of Concurrent Zero-Knowledge. In Crypto2000, Springer LNCS 1880, pages 451-468, 2000.
-
(2000)
Springer LNCS
, vol.1880
, pp. 451-468
-
-
Rosen, A.1
-
35
-
-
0022882770
-
How to Generate and Exchange Secrets
-
A. Yao. How to Generate and Exchange Secrets. In 27th FOCS, pages 162-167, 1986.
-
(1986)
27th FOCS
, pp. 162-167
-
-
Yao, A.1
|