-
1
-
-
0027629488
-
Common randomness in information theory and cryptography-part i: Secret sharing
-
July
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-part i: Secret sharing, " IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
2
-
-
85032862464
-
Multiparty protocols tolerating half faulty processors
-
D. Beaver, "Multiparty protocols tolerating half faulty processors, " CRYPTO, LNCS, vol. 435, pp. 560-572, 1989.
-
(1989)
CRYPTO, LNCS
, vol.435
, pp. 560-572
-
-
Beaver, D.1
-
3
-
-
0003619771
-
Perfect privacy for two party protocols
-
Harvard University
-
-, "Perfect privacy for two party protocols, " Technical Report TR-11-89, Harvard University, 1989.
-
(1989)
Technical Report TR-11-89
-
-
Beaver, D.1
-
4
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distribution computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distribution computation, " STOC, pp. 1-10, 1988.
-
(1988)
STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
17744380057
-
Coin flipping by telephone a protocol for solving impossible problems
-
Jan
-
M. Blum, "Coin flipping by telephone a protocol for solving impossible problems, " SIGACT News, vol. 15, no. 1, pp. 23-27, Jan 1983.
-
(1983)
SIGACT News
, vol.15
, Issue.1
, pp. 23-27
-
-
Blum, M.1
-
6
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
D. Chaum, C. Crépeau, and I. Damgård, "Multiparty unconditionally secure protocols, " STOC, pp. 11-19, 1988.
-
(1988)
STOC
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
7
-
-
45249104852
-
Secrecy capacities for multiterminal channel models
-
June
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiterminal channel models, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2437-2452, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2437-2452
-
-
Csiszár, I.1
Narayan, P.2
-
8
-
-
84905389695
-
On the communication complexity of secure computation
-
D. Data, M. M. Prabhakaran, and V. M. Prabhakara, "On the communication complexity of secure computation, " CRYPTO, LNCS, vol. 8617, pp. 199-216, 2014.
-
(2014)
CRYPTO, LNCS
, vol.8617
, pp. 199-216
-
-
Data, D.1
Prabhakaran, M.M.2
Prabhakara, V.M.3
-
9
-
-
84957611040
-
Lower bound for oblivious transfer reductions
-
Y. Dodis and S. Micali, "Lower bound for oblivious transfer reductions, " EUROCRYPT, LNCS, vol. 1592, pp. 42-55, 1999.
-
(1999)
EUROCRYPT, LNCS
, vol.1592
, pp. 42-55
-
-
Dodis, Y.1
Micali, S.2
-
10
-
-
0006932810
-
Common information is far less than mutual information
-
P. Gács and J. Körner, "Common information is far less than mutual information, " Problems of Control and Information Theory, vol. 2, no. 2, pp. 149-162, 1973.
-
(1973)
Problems of Control and Information Theory
, vol.2
, Issue.2
, pp. 149-162
-
-
Gács, P.1
Körner, J.2
-
11
-
-
0002365530
-
Privacy and communication complexity
-
E. Kushilevitz, "Privacy and communication complexity, " SIAM Journal on Math, vol. 5, no. 2, pp. 273-284, 1992.
-
(1992)
SIAM Journal on Math
, vol.5
, Issue.2
, pp. 273-284
-
-
Kushilevitz, E.1
-
12
-
-
77957602848
-
Information inequalities for joint distributions, with interpretations and applications
-
June
-
M. Madiman and P. Tetali, "Information inequalities for joint distributions, with interpretations and applications, " IEEE Trans. Inf. Theory, vol. 56, no. 6, pp. 2699-2713, June 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.6
, pp. 2699-2713
-
-
Madiman, M.1
Tetali, P.2
-
13
-
-
70350679063
-
Complexity of multiparty computation problems: The case of 2-party symmetric secure function evaluation
-
H. K. Maji, M. Prabhakaran, and M. Rosulek, "Complexity of multiparty computation problems: The case of 2-party symmetric secure function evaluation, " TCC, LNCS, vol. 5444, pp. 256-273, 2009.
-
(2009)
TCC, LNCS
, vol.5444
, pp. 256-273
-
-
Maji, H.K.1
Prabhakaran, M.2
Rosulek, M.3
-
14
-
-
84871588526
-
A unified characterization of completeness and triviality for secure function evaluation
-
-, "A unified characterization of completeness and triviality for secure function evaluation, " INDOCRYPTO, LNCS, vol. 7668, pp. 40-59, 2012.
-
(2012)
INDOCRYPTO, LNCS
, vol.7668
, pp. 40-59
-
-
Maji, H.K.1
Prabhakaran, M.2
Rosulek, M.3
-
15
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information, " IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
17
-
-
84901268112
-
Assisted common information with an application to secure twoparty samplign
-
June
-
-, "Assisted common information with an application to secure twoparty samplign, " IEEE Trans. Inf. Theory, vol. 60, no. 6, pp. 3413-3434, June 2014.
-
(2014)
IEEE Trans. Inf. Theory
, vol.60
, Issue.6
, pp. 3413-3434
-
-
Prabhakaran, V.M.1
Prabhakaran, M.M.2
-
19
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
T. Rabin and M. Ben-Or, "Verifiable secret sharing and multiparty protocols with honest majority, " STOC, pp. 73-85, 1989.
-
(1989)
STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
20
-
-
80053961199
-
When is a function securely computable
-
October
-
H. Tyagi, P. Narayan, and P. Gupta, "When is a function securely computable" IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6337-6350, October 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.10
, pp. 6337-6350
-
-
Tyagi, H.1
Narayan, P.2
Gupta, P.3
-
21
-
-
84890417132
-
Information-theoretically secure threeparty computation with one corrupted party
-
July
-
Y. Wang, P. Ishwar, and S. Rane, "Information-theoretically secure threeparty computation with one corrupted party, " Proc. IEEE International Symposium on Information Theory, pp. 3160-3164, July 2013.
-
(2013)
Proc. IEEE International Symposium on Information Theory
, pp. 3160-3164
-
-
Wang, Y.1
Ishwar, P.2
Rane, S.3
-
22
-
-
45249110618
-
New monotones and lower bounds in unconditional two-party computation
-
June
-
S. Wolf and J. Wullschleger, "New monotones and lower bounds in unconditional two-party computation, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2792-2797, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2792-2797
-
-
Wolf, S.1
Wullschleger, J.2
|