-
1
-
-
33746365751
-
Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
-
D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology, 4:75-122, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 75-122
-
-
Beaver, D.1
-
2
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computations
-
ACM
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic fault-tolerant distributed computations. In 20th STOC, pp. 1-10. ACM, 1988.
-
(1988)
20Th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
85048601848
-
Cryptographic protocols provably secure against dynamic dversaries
-
Springer LNCS
-
D. Beaver and S. Haber. Cryptographic protocols provably secure against dynamic dversaries. Eurocrypt '92, pp. 307-323. Springer LNCS 658, 1992.
-
(1992)
Eurocrypt '92
, vol.658
, pp. 307-323
-
-
Beaver, D.1
Haber, S.2
-
5
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
ACM
-
D. Chaum, C. Crepeau, and I. Damgård. Multiparty unconditionally secure protocols. In 20th STOC, pp. 11-19. ACM, 1988.
-
(1988)
20Th STOC
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgård, I.3
-
6
-
-
0022199386
-
Veriffiable secret sharing and achieving simultaneity in the presence of faults
-
IEEE
-
B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. Veriffiable secret sharing and achieving simultaneity in the presence of faults. In 26th FOCS, pp. 383-395. IEEE, 1985.
-
(1985)
26Th FOCS
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
8
-
-
0029723583
-
Adaptively secure multi-party computation
-
ACM
-
Ran Canetti, Uri Feige, Oded Goldreich, andMoni Naor. Adaptively secure multi-party computation. In 28th STOC, pp. 639-648. ACM, 1996.
-
(1996)
28Th STOC
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
9
-
-
84894281582
-
An optimal algorithm for synchronous Byzantine agreement
-
ACM
-
P. Feldman and S. Micali. An optimal algorithm for synchronous Byzantine agreement. In 20th STOC, pp. 148-161. ACM, 1988.
-
(1988)
20Th STOC
, pp. 148-161
-
-
Feldman, P.1
Micali, S.2
-
10
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
Springer LNCS
-
S. Goldwasser and L. Levin. Fair computation of general functions in presence of immoral majority. Crypto '90, pp. 77-93. Springer LNCS 537, 1990.
-
(1990)
Crypto '90
, vol.537
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
12
-
-
0031628398
-
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
-
ACM
-
R. Gennaro, M. Rabin, and T Rabin. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In 17th PODC, pp. 101-111. ACM, 1998.
-
(1998)
17Th PODC
, pp. 101-111
-
-
Gennaro, R.1
Rabin, M.2
Rabin, T.3
-
13
-
-
0030693496
-
Complete characterization of adversaries tolerable in general multiparty computations
-
ACM
-
M. Hirt and U. Maurer. Complete characterization of adversaries tolerable in general multiparty computations. In 16th PODC, pp. 25-34. ACM, 1998.
-
(1998)
16Th PODC
, pp. 25-34
-
-
Hirt, M.1
Maurer, U.2
-
15
-
-
84974655726
-
Secure computation
-
Springer
-
S. Micali and P. Rogaway. Secure computation. Crypto '91, pp. 392-404. Springer LNCS 576, 1991.
-
(1991)
Crypto '91
, vol.576
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
17
-
-
0028542745
-
Robust sharing of secrets when the dealer is honest or faulty
-
T. Rabin. Robust sharing of secrets when the dealer is honest or faulty. Journal of the ACM, 41(6):1089-1109, 1994.
-
(1994)
Journal of the ACM
, vol.41
, Issue.6
, pp. 1089-1109
-
-
Rabin, T.1
-
18
-
-
0024859552
-
Veriffiable secret sharing and multiparty protocols with honest majority
-
ACM
-
T. Rabin and M. Ben-Or. Veriffiable secret sharing and multiparty protocols with honest majority. In 21st STOC, pp. 73-85. ACM, 1989.
-
(1989)
21St STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
20
-
-
0020312165
-
Protocols for secure computations
-
IEEE
-
A.C. Yao. Protocols for secure computations. In 23rd FOCS, pp. 160-164. IEEE, 1982.
-
(1982)
23Rd FOCS
, pp. 160-164
-
-
Yao, A.C.1
|