-
1
-
-
85030318015
-
Multi Party Fault Tolerant Computation with Faulty Majority
-
Santa Barbara, CA, August
-
D. Beaver, S. Goldwasser. Multi Party Fault Tolerant Computation with Faulty Majority, Proceedings of Crypto89, Santa Barbara, CA, August 1989.
-
(1989)
Proceedings of Crypto89
-
-
Beaver, D.1
Goldwasser, S.2
-
2
-
-
0024769014
-
Multi Party Fault Tolerant Computation with Faulty Majority Based on Oblivious Transfer
-
Duke, NC, October
-
D. Beaver, S. Goldwasser. Multi Party Fault Tolerant Computation with Faulty Majority Based on Oblivious Transfer, Proceedings of FOCS89, Duke, NC, October 1989, pp. 468-473.
-
(1989)
Proceedings of FOCS89
, pp. 468-473
-
-
Beaver, D.1
Goldwasser, S.2
-
3
-
-
84898960610
-
Completeness Theorems for NonCryptographic Fault-Tolerant Distributed Computation
-
M. Ben-Or, S. Goldwasser, A. Wigderson. Completeness Theorems for NonCryptographic Fault-Tolerant Distributed Computation. Proc. of 20th STOC 1988, pp. 1-10.
-
(1988)
Proc. of 20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
4
-
-
85030329461
-
IP is in Zero-Knowledge
-
Crypto
-
Ben-Or, Michael, Oded Goldreich, Shafi Goldwasser, Johan Hastad, Joe Kilian, Silvio Micali, Phillip Rogaway, “IP is in Zero-Knowledge,” Proceedings, Advances in Cryptology, Crypto 1988.
-
(1988)
Proceedings, Advances in Cryptology
-
-
Ben-Or, M.1
Goldreich, O.2
Goldwasser, S.3
Hastad, J.4
Kilian, J.5
Micali, S.6
Rogaway, P.7
-
5
-
-
0024859552
-
Verifiable Secret Sharing and Multiparty Protocols with Honest Majority
-
Rabin, T. and M. Ben-Or. “Verifiable Secret Sharing and Multiparty Protocols with Honest Majority.” Proc. of 21st STOC, ACM, 1989.
-
(1989)
Proc. of 21st STOC, ACM
-
-
Rabin, T.1
Ben-Or, M.2
-
6
-
-
0019669520
-
Security Proofs for Information Protection Systems
-
IEEE Computer Society Press, NY
-
Blakely, T. Security Proofs for Information Protection Systems. Proceedings of the 1980 Symposium on Security and Privacy, IEEE Computer Society Press, NY, pp. 79-88, 1981.
-
(1981)
Proceedings of the 1980 Symposium on Security and Privacy
, pp. 79-88
-
-
Blakely, T.1
-
8
-
-
0022864717
-
Information Theoritic Reductions Among Disclosure Problems
-
Brassard, Gilles, Claude Crépeau, and Jean-Marc Robert. “Information Theoritic Reductions Among Disclosure Problems,” Proceedings of the 27th FOCS, IEEE, 1986, 168-173.
-
(1986)
Proceedings of the 27th FOCS, IEEE
, pp. 168-173
-
-
Brassard, G.1
Crépeau, C.2
Robert, J.-M.3
-
11
-
-
53449100997
-
Multiparty Computations Ensuring Secrecy of Each Party’s Input and Correctness of the Output
-
Springer-Verlag
-
Chaum, David, Ivan Damgaard, and Jeroen van de Graaf. “Multiparty Computations Ensuring Secrecy of Each Party’s Input and Correctness of the Output,” Proceedings of CRYPTO '85, Springer-Verlag, 1986, 477-488.
-
(1986)
Proceedings of CRYPTO '85
, pp. 477-488
-
-
Chaum, D.1
Damgaard, I.2
van de Graaf, J.3
-
12
-
-
0012610677
-
Limits on the Security of Coin Flips When Half the Processors are Faulty
-
R. Cleve. Limits on the Security of Coin Flips When Half the Processors are Faulty. STOC 1986.
-
(1986)
STOC
-
-
Cleve, R.1
-
13
-
-
85030317602
-
A Robust and Verifiable Cryptographically Secure Election
-
Cohen, Fischer. A Robust and Verifiable Cryptographically Secure Election. FOCS 1985.
-
(1985)
FOCS
-
-
Cohen, F.1
-
14
-
-
0024132071
-
Achieving Oblivious Transfer Using Weakened Security Assumptions
-
C. Crepeau and J. Kilian. Achieving Oblivious Transfer Using Weakened Security Assumptions. FOCS 1988.
-
(1988)
FOCS
-
-
Crepeau, C.1
Kilian, J.2
-
15
-
-
85030316071
-
On the Equivalence of Two Types of Oblivious Transfer
-
Crépeau Claude, “On the Equivalence of Two Types of Oblivious Transfer”, Crypto87.
-
Crypto87
-
-
Claude, C.1
-
16
-
-
0022199386
-
Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults
-
B. Chor, S. Goldwasser, S. Micali, B. Awerbuch. Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults. FOCS 1985.
-
(1985)
FOCS
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
17
-
-
85030322385
-
Achieving Independence in Logarithmic Number of Rounds
-
B. Chor, M. Rabin. Achieving Independence in Logarithmic Number of Rounds. PODC 1986.
-
(1986)
PODC
-
-
Chor, B.1
Rabin, M.2
-
18
-
-
0022080529
-
A Randomized Protocol for Signing Contracts
-
Even S., Goldreich O., and A. Lempel, A Randomized Protocol for Signing Contracts, CACM, vol. 28, no. 6, 1985, pp. 637-647.
-
(1985)
CACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
20
-
-
0343851460
-
Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public Key Model
-
Z. Galil, S. Haber, M. Yung. Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public Key Model. Proc. CRYPTO 1987.
-
(1987)
Proc. CRYPTO
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
21
-
-
0023545076
-
How to Play Any Mental Game, or A Completeness Theorem for Protocols with Honest Majority
-
O. Goldreich, S. Micali, A. Wigderson. How to Play Any Mental Game, or A Completeness Theorem for Protocols with Honest Majority. Proc. of 19th STOC 1987, pp. 218-229.
-
(1987)
Proc. of 19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
22
-
-
0141653334
-
How to Solve any Protocol Problem: An Efficiency Improvement
-
Goldreich, O., Vainish, R. “How to Solve any Protocol Problem: An Efficiency Improvement”, Crypto 87.
-
Crypto 87
-
-
Goldreich, O.1
Vainish, R.2
-
23
-
-
0024611659
-
The Knowledge Complexity of Interactive Proof Systems
-
Goldwasser, Micali, Rackoff. The Knowledge Complexity of Interactive Proof Systems. SIAM J. of Comp 1989.
-
(1989)
SIAM J. of Comp
-
-
Goldwasser1
Micali2
Rackoff3
-
26
-
-
0001863229
-
On The Power of Oblivious Transfer
-
Also appeared in Uses of Randomness In Algorithms and Protocols, An ACM Distinguished Dissertation 1989
-
Kilian, Joe, “On The Power of Oblivious Transfer,” Proceedings of the 20th STOC, ACM, 1988, pp. 20-29. Also appeared in Uses of Randomness In Algorithms and Protocols, An ACM Distinguished Dissertation 1989.
-
(1988)
Proceedings of the 20th STOC, ACM
, pp. 20-29
-
-
Kilian, J.1
-
29
-
-
0018545449
-
How to Share a Secret
-
A. Shamir. How to Share a Secret. CACM 22, 612-613, 1979.
-
(1979)
CACM 22
, pp. 612-613
-
-
Shamir, A.1
-
31
-
-
0022882770
-
How to Generate and Exchange Secrets
-
Yao, Andrew C. “How to Generate and Exchange Secrets,” Proceedings of the 27th poos, IEEE, 1986, 162-167.
-
(1986)
Proceedings of the 27th poos, IEEE
, pp. 162-167
-
-
Yao, A.C.1
|