-
1
-
-
0024940038
-
Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction
-
Judit Bar-Ilan and Donald Beaver. Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction. In Proceedings of 8th ACM PODC, pages 201–210, August 1989. 118
-
(1989)
Proceedings of 8Th ACM PODC
, pp. 201-210
-
-
Bar-Ilan, J.1
Beaver, D.2
-
2
-
-
33746365751
-
Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
-
Donald Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology, pages 75–122, 1991.117
-
(1991)
Journal of Cryptology
, pp. 75-122
-
-
Beaver, D.1
-
3
-
-
84979502594
-
Security with low communication overhead (Extended abstract)
-
Donald Beaver, Joan Feigenbaum, Joe Kilian, and Phillip Rogaway. Security with low communication overhead (extended abstract). In CRYPTO’90, pages 62–76, 1990.118
-
(1990)
CRYPTO’90
, pp. 62-76
-
-
Beaver, D.1
Feigenbaum, J.2
Kilian, J.3
Rogaway, P.4
-
4
-
-
0025137207
-
The round complexity of secure protocols(Extended abstract)
-
Donald Beaver, Silvio Micali, and Phillip Rogaway. The round complexity of secure protocols(extended abstract). In Proceedings of 22nd ACM STOC, pages 503–513, 1990.118
-
(1990)
Proceedings of 22Nd ACM STOC
, pp. 503-513
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
5
-
-
0027188428
-
Asynchronous secure computations
-
M. Ben-Or, R. Canetti, and O. Goldreich. Asynchronous secure computations. In Proceedings of 25th ACM STOC, pages 52–61, 1993.117, 117, 118, 118, 118, 118, 118, 120, 121, 121, 121, 122, 122, 126, 126, 129
-
(1993)
Proceedings of 25Th ACM STOC
, pp. 52-61
-
-
Ben-Or, M.1
Canetti, R.2
Goldreich, O.3
-
6
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic fault-tolerant distributed computation. In Proceedings of 20th ACM STOC, pages 1–10, 1988.117, 120
-
(1988)
Proceedings of 20Th ACM STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
7
-
-
85008184918
-
Asynchronous secure computation with optimal resilience
-
M. Ben-Or, B. Kelmer, and T. Rabin. Asynchronous secure computation with optimal resilience. In Proceedings of 13th ACM PODC, pages 183–192, 1994.117, 118, 118, 120, 121, 121
-
(1994)
Proceedings of 13Th ACM PODC
, pp. 183-192
-
-
Ben-Or, M.1
Kelmer, B.2
Rabin, T.3
-
8
-
-
0021650418
-
An asynchronous_(N−1)/3_-resilient consensus protocol
-
G. Bracha. An asynchronous _(n − 1)/3_-resilient consensus protocol. In Proceedings of 3rd ACM PODC, pages 154–162, 1984.119
-
(1984)
Proceedings of 3Rd ACM PODC
, pp. 154-162
-
-
Bracha, G.1
-
12
-
-
0002626155
-
Efficient general secure multiparty computation from any linear secret sharing scheme
-
R. Cramer, I. Damgard, and U. Maurer. Efficient general secure multiparty computation from any linear secret sharing scheme. In EUROCRYPT2000. Springer-Verlag, 2000.121, 122
-
(2000)
EUROCRYPT2000. Springer-Verlag
-
-
Cramer, R.1
Damgard, I.2
Maurer, U.3
-
13
-
-
33746088658
-
Efficient multiparty computations secure against an adaptive adversary
-
Ronald Cramer, Ivan Damgard, Stefan Dziembowski, Martin Hirt, and Tal Rabin. Efficient multiparty computations secure against an adaptive adversary. In EUROCRYPT’99. Springer-Verlag, 1999.117
-
(1999)
EUROCRYPT’99. Springer-Verlag
-
-
Cramer, R.1
Damgard, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
14
-
-
0026985378
-
Communication complexity of secure computation
-
Matthew K. Franklin and Moti Yung. Communication complexity of secure computation. In Proceedings of 24th ACM STOC, pages 699–710, 1992.118
-
(1992)
Proceedings of 24Th ACM STOC
, pp. 699-710
-
-
Franklin, M.K.1
Yung, M.2
-
15
-
-
0031628398
-
Simplified VSS and fasttrack multiparty computations with applications to threshold cryptography
-
Rosario Gennaro, Micheal O. Rabin, and Tal Rabin. Simplified VSS and fasttrack multiparty computations with applications to threshold cryptography. In Proceedings of 17th ACM PODC, 1998.118, 123, 124
-
(1998)
Proceedings of 17Th ACM PODC
-
-
Gennaro, R.1
Rabin, M.O.2
Rabin, T.3
-
17
-
-
23044524221
-
Efficient multi-party computation
-
Springer-Verlag, December
-
Martin Hirt, Ueli Maurer, and Bartosz Przydatek. Efficient multi-party computation. In ASIACRYPT 2000. Springer-Verlag, December 2000.118, 118, 119, 120
-
(2000)
ASIACRYPT
, pp. 2000
-
-
Hirt, M.1
Maurer, U.2
Przydatek, B.3
-
18
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In Proceedings of 21st ACM STOC, pages 73–85, 1989.117
-
(1989)
Proceedings of 21St ACM STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
19
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. CACM, 22:612–613, 1979.120
-
(1979)
CACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
|