메뉴 건너뛰기




Volumn 537 LNCS, Issue , 1991, Pages 77-93

Fair computation of general functions in presence of immoral majority

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 84955564077     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-38424-3_6     Document Type: Conference Paper
Times cited : (182)

References (31)
  • 1
    • 85030318015 scopus 로고
    • Multi Party Fault Tolerant Computation with Faulty Majority
    • Santa Barbara, CA, August
    • D. Beaver, S. Goldwasser. Multi Party Fault Tolerant Computation with Faulty Majority, Proceedings of Crypto89, Santa Barbara, CA, August 1989.
    • (1989) Proceedings of Crypto89
    • Beaver, D.1    Goldwasser, S.2
  • 2
    • 0024769014 scopus 로고
    • Multi Party Fault Tolerant Computation with Faulty Majority Based on Oblivious Transfer
    • Duke, NC, October
    • D. Beaver, S. Goldwasser. Multi Party Fault Tolerant Computation with Faulty Majority Based on Oblivious Transfer, Proceedings of FOCS89, Duke, NC, October 1989, pp. 468-473.
    • (1989) Proceedings of FOCS89 , pp. 468-473
    • Beaver, D.1    Goldwasser, S.2
  • 3
    • 84898960610 scopus 로고
    • Completeness Theorems for NonCryptographic Fault-Tolerant Distributed Computation
    • M. Ben-Or, S. Goldwasser, A. Wigderson. Completeness Theorems for NonCryptographic Fault-Tolerant Distributed Computation. Proc. of 20th STOC 1988, pp. 1-10.
    • (1988) Proc. of 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 5
    • 0024859552 scopus 로고
    • Verifiable Secret Sharing and Multiparty Protocols with Honest Majority
    • Rabin, T. and M. Ben-Or. “Verifiable Secret Sharing and Multiparty Protocols with Honest Majority.” Proc. of 21st STOC, ACM, 1989.
    • (1989) Proc. of 21st STOC, ACM
    • Rabin, T.1    Ben-Or, M.2
  • 6
    • 0019669520 scopus 로고
    • Security Proofs for Information Protection Systems
    • IEEE Computer Society Press, NY
    • Blakely, T. Security Proofs for Information Protection Systems. Proceedings of the 1980 Symposium on Security and Privacy, IEEE Computer Society Press, NY, pp. 79-88, 1981.
    • (1981) Proceedings of the 1980 Symposium on Security and Privacy , pp. 79-88
    • Blakely, T.1
  • 11
    • 53449100997 scopus 로고
    • Multiparty Computations Ensuring Secrecy of Each Party’s Input and Correctness of the Output
    • Springer-Verlag
    • Chaum, David, Ivan Damgaard, and Jeroen van de Graaf. “Multiparty Computations Ensuring Secrecy of Each Party’s Input and Correctness of the Output,” Proceedings of CRYPTO '85, Springer-Verlag, 1986, 477-488.
    • (1986) Proceedings of CRYPTO '85 , pp. 477-488
    • Chaum, D.1    Damgaard, I.2    van de Graaf, J.3
  • 12
    • 0012610677 scopus 로고
    • Limits on the Security of Coin Flips When Half the Processors are Faulty
    • R. Cleve. Limits on the Security of Coin Flips When Half the Processors are Faulty. STOC 1986.
    • (1986) STOC
    • Cleve, R.1
  • 13
    • 85030317602 scopus 로고
    • A Robust and Verifiable Cryptographically Secure Election
    • Cohen, Fischer. A Robust and Verifiable Cryptographically Secure Election. FOCS 1985.
    • (1985) FOCS
    • Cohen, F.1
  • 14
    • 0024132071 scopus 로고
    • Achieving Oblivious Transfer Using Weakened Security Assumptions
    • C. Crepeau and J. Kilian. Achieving Oblivious Transfer Using Weakened Security Assumptions. FOCS 1988.
    • (1988) FOCS
    • Crepeau, C.1    Kilian, J.2
  • 15
    • 85030316071 scopus 로고    scopus 로고
    • On the Equivalence of Two Types of Oblivious Transfer
    • Crépeau Claude, “On the Equivalence of Two Types of Oblivious Transfer”, Crypto87.
    • Crypto87
    • Claude, C.1
  • 16
    • 0022199386 scopus 로고
    • Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults
    • B. Chor, S. Goldwasser, S. Micali, B. Awerbuch. Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults. FOCS 1985.
    • (1985) FOCS
    • Chor, B.1    Goldwasser, S.2    Micali, S.3    Awerbuch, B.4
  • 17
    • 85030322385 scopus 로고
    • Achieving Independence in Logarithmic Number of Rounds
    • B. Chor, M. Rabin. Achieving Independence in Logarithmic Number of Rounds. PODC 1986.
    • (1986) PODC
    • Chor, B.1    Rabin, M.2
  • 18
    • 0022080529 scopus 로고
    • A Randomized Protocol for Signing Contracts
    • Even S., Goldreich O., and A. Lempel, A Randomized Protocol for Signing Contracts, CACM, vol. 28, no. 6, 1985, pp. 637-647.
    • (1985) CACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 20
    • 0343851460 scopus 로고
    • Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public Key Model
    • Z. Galil, S. Haber, M. Yung. Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public Key Model. Proc. CRYPTO 1987.
    • (1987) Proc. CRYPTO
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 21
    • 0023545076 scopus 로고
    • How to Play Any Mental Game, or A Completeness Theorem for Protocols with Honest Majority
    • O. Goldreich, S. Micali, A. Wigderson. How to Play Any Mental Game, or A Completeness Theorem for Protocols with Honest Majority. Proc. of 19th STOC 1987, pp. 218-229.
    • (1987) Proc. of 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 22
    • 0141653334 scopus 로고    scopus 로고
    • How to Solve any Protocol Problem: An Efficiency Improvement
    • Goldreich, O., Vainish, R. “How to Solve any Protocol Problem: An Efficiency Improvement”, Crypto 87.
    • Crypto 87
    • Goldreich, O.1    Vainish, R.2
  • 23
    • 0024611659 scopus 로고
    • The Knowledge Complexity of Interactive Proof Systems
    • Goldwasser, Micali, Rackoff. The Knowledge Complexity of Interactive Proof Systems. SIAM J. of Comp 1989.
    • (1989) SIAM J. of Comp
    • Goldwasser1    Micali2    Rackoff3
  • 26
    • 0001863229 scopus 로고
    • On The Power of Oblivious Transfer
    • Also appeared in Uses of Randomness In Algorithms and Protocols, An ACM Distinguished Dissertation 1989
    • Kilian, Joe, “On The Power of Oblivious Transfer,” Proceedings of the 20th STOC, ACM, 1988, pp. 20-29. Also appeared in Uses of Randomness In Algorithms and Protocols, An ACM Distinguished Dissertation 1989.
    • (1988) Proceedings of the 20th STOC, ACM , pp. 20-29
    • Kilian, J.1
  • 29
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir. How to Share a Secret. CACM 22, 612-613, 1979.
    • (1979) CACM 22 , pp. 612-613
    • Shamir, A.1
  • 31
    • 0022882770 scopus 로고
    • How to Generate and Exchange Secrets
    • Yao, Andrew C. “How to Generate and Exchange Secrets,” Proceedings of the 27th poos, IEEE, 1986, 162-167.
    • (1986) Proceedings of the 27th poos, IEEE , pp. 162-167
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.