-
1
-
-
85029469140
-
Formal Definitions for Secure Distributed Protocols
-
October, (Paper not presented at workshop but invited to appear in proceedings.)
-
D. Beaver, “Formal Definitions for Secure Distributed Protocols,” in Distributed Computing and Cryptography - Proceedings of a DIMACS Workshop, October 1989. (Paper not presented at workshop but invited to appear in proceedings.)
-
(1989)
Distributed Computing and Cryptography - Proceedings of a DIMACS Workshop
-
-
Beaver, D.1
-
3
-
-
0024769014
-
Multiparty Computations with Faulty Majority
-
D. Beaver and S. Goldwasser, “Multiparty Computations with Faulty Majority,” Proc. of the 30th FOCS (1989), 468-473.
-
(1989)
Proc. of the 30th FOCS
, pp. 468-473
-
-
Beaver, D.1
Goldwasser, S.2
-
5
-
-
49949117411
-
A Robust and Verifiable Cryptographically Secure Election Scheme
-
J. Benaloh (Cohen) and M. Fischer, “A Robust and Verifiable Cryptographically Secure Election Scheme,” Proc. of the 26th FOCS (1985), 372-381.
-
(1985)
Proc. of the 26th FOCS
, pp. 372-381
-
-
Benaloh Cohen, J.1
Fischer, M.2
-
6
-
-
84898960610
-
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
-
M. Ben-Or, S. Goldwasser and A. Wigderson, “Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation,” Proc. of the 20th STOC (1988), 1-10.
-
(1988)
Proc. of the 20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
8
-
-
0021522644
-
How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits
-
Earlier version in Proc. of the 23rd FOCS (1982)
-
M. Blum and S. Micali, “How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits,” SIAM J. of Computing, Vol. 13, No. 4, 1984, 850-864. Earlier version in Proc. of the 23rd FOCS (1982).
-
(1984)
SIAM J. of Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
9
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
February
-
D. Chaum. “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,” Comm. of the ACM 24(2) February 1981, 84-88.
-
(1981)
Comm. of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
10
-
-
0000867507
-
Minimum disclosure proofs of knowledge
-
October
-
G. Brassard, D. Chaum and C. Crépeau, “Minimum disclosure proofs of knowledge,” Journal of Computer and System Science, Vol. 37, No. 2, October 1988, 156-189.
-
(1988)
Journal of Computer and System Science
, vol.37
, Issue.2
, pp. 156-189
-
-
Brassard, G.1
Chaum, D.2
Crépeau, C.3
-
12
-
-
84864708144
-
Multiparty Computations Ensuring the Privacy of Each Party’s Input and Correctness of the Result
-
D. Chaum, I. Damgård and J. van de Graff, “Multiparty Computations Ensuring the Privacy of Each Party’s Input and Correctness of the Result,” CRYPTO-87 Proceedings, 87-119.
-
CRYPTO-87 Proceedings
, pp. 87-119
-
-
Chaum, D.1
Damgård, I.2
Van De Graff, J.3
-
14
-
-
11744265658
-
Private Computations over the Integers
-
Earlier version by Chor and Kushilevitz, “Sharing over Infinite Domains,” CRYPTO-89 Proceedings, Springer-Verlag, 299-306
-
B. Chor, M. Geréb-Graus and E. Kushilevitz, “Private Computations over the Integers,” Proc. of the 31st FOCS (1990), 325-344. Earlier version by Chor and Kushilevitz, “Sharing over Infinite Domains,” CRYPTO-89 Proceedings, Springer-Verlag, 299-306.
-
(1990)
Proc. of the 31st FOCS
, pp. 325-344
-
-
Chor, B.1
Geréb-Graus, M.2
Kushilevitz, E.3
-
15
-
-
0022199386
-
Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults
-
B. Chor, O. Goldwasser, S. Micali and B. Awerbuch, “Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults,” Proc. of the 26th FOCS (1985), 383-95.
-
(1985)
Proc. of the 26th FOCS
, pp. 383-395
-
-
Chor, B.1
Goldwasser, O.2
Micali, S.3
Awerbuch, B.4
-
19
-
-
0000927535
-
Paths, Trees, and Flowers
-
J. Edmonds, “Paths, Trees, and Flowers,” Canadian J. of Mathematics, 17: 449-467, 1965.
-
(1965)
Canadian J. of Mathematics
, vol.17
, pp. 449-467
-
-
Edmonds, J.1
-
21
-
-
0024984004
-
Witness indistinguishability and witness hiding protocols
-
U. Feige and A. Shamir, “Witness indistinguishability and witness hiding protocols,” Proc. of the 22nd STOC (1990), 416-426.
-
(1990)
Proc. of the 22nd STOC
, pp. 416-426
-
-
Feige, U.1
Shamir, A.2
-
24
-
-
84894281582
-
An Optimal Algorithms for Synchronous Byzantine Agreement
-
MIT/LCS Technical Report TM-425 (June 1990)
-
P. Feldman and S. Micali, “An Optimal Algorithms for Synchronous Byzantine Agreement,” MIT/LCS Technical Report TM-425 (June 1990). Previous version in Proc. of the 20th STOC (1988), 148-161.
-
(1988)
Previous version in Proc. of the 20th STOC
, pp. 148-161
-
-
Feldman, P.1
Micali, S.2
-
25
-
-
84976655650
-
Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model
-
Z. Galil, S. Haber and M. Yung, “Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model,” CRYPTO-87 Proceedings, 135-155.
-
CRYPTO-87 Proceedings
, pp. 135-155
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
27
-
-
33747194089
-
Fair Computation of General Functions in Presence of Immoral Majority
-
S. Goldwasser and L. Levin, “Fair Computation of General Functions in Presence of Immoral Majority,” CRYPTO-90 Proceedings, 75-84.
-
CRYPTO-90 Proceedings
, pp. 75-84
-
-
Goldwasser, S.1
Levin, L.2
-
28
-
-
0021409284
-
Probabilistic Encryption
-
Earlier version in Proc. of the 14th STOC (1982)
-
S. Goldwasser and S. Micali, “Probabilistic Encryption,” Journal of Computer and System Sciences, Vol. 28, No. 2 (1984), 270-299. Earlier version in Proc. of the 14th STOC (1982).
-
(1984)
Journal of Computer and System Sciences
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
29
-
-
0024611659
-
The Knowledge Complexity of Interactive Proof Systems
-
(February, Earlier version in Proc. of the 17th STOC (1985), 291-305
-
O. Goldwasser, S. Micali, and C. Rackoff, “The Knowledge Complexity of Interactive Proof Systems,” SIAM J. of Comp., Vol. 18, No. 1, 186-208 (February 1989). Earlier version in Proc. of the 17th STOC (1985), 291-305.
-
(1989)
SIAM J. of Comp
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, O.1
Micali, S.2
Rackoff, C.3
-
30
-
-
0023985465
-
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
-
April
-
S. Goldwasser, S. Micali, and R. Rivest, “A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks,” SIAM Journal on Computing, 17(2): 281-308, April 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
32
-
-
0141653334
-
How to Solve any Protocol Problem-An Efficiency Improvement
-
O. Goldreich and R. Vainish, “How to Solve any Protocol Problem-An Efficiency Improvement,” CRYPTO-87 Proceedings, 76-86.
-
CRYPTO-87 Proceedings
, pp. 76-86
-
-
Goldreich, O.1
Vainish, R.2
-
33
-
-
35248878310
-
Multi-Party Cryptographic Computation: Techniques and Applications
-
Ph.D. Thesis
-
S. Haber, “Multi-Party Cryptographic Computation: Techniques and Applications,” Columbia University Ph.D. Thesis (1988).
-
(1988)
Columbia University
-
-
Haber, S.1
-
37
-
-
51249173191
-
One-Way Functions and Pseudorandom Generators
-
Earlier version in Proc. of the 17th STOC (1985)
-
L. Levin, “One-Way Functions and Pseudorandom Generators,” Combinatorica, Vol. 17, 1988, 357-363. Earlier version in Proc. of the 17th STOC (1985).
-
(1988)
Combinatorica
, vol.17
, pp. 357-363
-
-
Levin, L.1
-
38
-
-
0020889143
-
How to Simultaneously Exchange a Secret Bit by Flipping a Symmetrically Biased Coin
-
M. Luby, S. Micali and C. Rackoff, “How to Simultaneously Exchange a Secret Bit by Flipping a Symmetrically Biased Coin,” Proc of the 24th FOCS (1983).
-
(1983)
Proc of the 24th FOCS
-
-
Luby, M.1
Micali, S.2
Rackoff, C.3
-
40
-
-
0023985474
-
The Notion of Security for Probabilistic Cryptosystems
-
April
-
S. Micali, C. Rackoff and B. Sloan, “The Notion of Security for Probabilistic Cryptosystems,” SIAM J. of Computing, 17(2): 412-26, April 1988.
-
(1988)
SIAM J. of Computing
, vol.17
, Issue.2
, pp. 412-426
-
-
Micali, S.1
Rackoff, C.2
Sloan, B.3
-
42
-
-
0023601199
-
On the Cunning Power of Cheating Verifiers: Some Observations about Zero Knowledge Proofs
-
Y. Oren, “On the Cunning Power of Cheating Verifiers: Some Observations about Zero Knowledge Proofs,” Proc. of the 28th FOCS (1987), 462-471.
-
(1987)
Proc. of the 28th FOCS
, pp. 462-471
-
-
Oren, Y.1
-
43
-
-
84976810569
-
Reaching Agreement in the Presence of Faults
-
M. Pease, R. Shostak and L. Lamport, “Reaching Agreement in the Presence of Faults,” J. of the ACM Vol. 27, No. 2, 1980.
-
(1980)
J. of the ACM
, vol.27
, Issue.2
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
44
-
-
0003462641
-
How to Exchange Secrets by Oblivious Transfer
-
Aiken Computation Laboratory, Harvard University
-
M. Rabin, “How to Exchange Secrets by Oblivious Transfer,” Technical Memo TR-81, Aiken Computation Laboratory, Harvard University, 1981.
-
(1981)
Technical Memo TR-81
-
-
Rabin, M.1
-
45
-
-
0024859552
-
Verifiable Secret Sharing and Multiparty Protocols with Honest Majority
-
T. Rabin and M. Ben-Or, “Verifiable Secret Sharing and Multiparty Protocols with Honest Majority,” Proc. of the 21st STOC (1989), 73-85.
-
(1989)
Proc. of the 21st STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
46
-
-
3042680831
-
Mental Poker
-
D. D. Klarner, editor, Wadsworth International
-
A. Shamir, R. Rivest, and L. Adleman, “Mental Poker,” in Mathematical Gardener, D. D. Klarner, editor, Wadsworth International (1981) pp 37-43.
-
(1981)
Mathematical Gardener
, pp. 37-43
-
-
Shamir, A.1
Rivest, R.2
Adleman, L.3
-
47
-
-
0023568495
-
Random Self-Reducibility and Zero Knowledge Interactive Proofs of Possession of Information
-
M. Tompa and H. Woll, “Random Self-Reducibility and Zero Knowledge Interactive Proofs of Possession of Information,” Proc. of the 28th FOCS (1987), 472-482.
-
(1987)
Proc. of the 28th FOCS
, pp. 472-482
-
-
Tompa, M.1
Woll, H.2
-
48
-
-
0020312165
-
Protocols for Secure Computation
-
A. Yao, “Protocols for Secure Computation,” Proc. of the 23 FOCS (1982), 160-164.
-
(1982)
Proc. of the 23 FOCS
, pp. 160-164
-
-
Yao, A.1
-
49
-
-
0020301290
-
Theory and Applications of Trapdoor Functions
-
A. Yao, “Theory and Applications of Trapdoor Functions,” Proc. of the 23 FOCS (1982) 80-91.
-
(1982)
Proc. of the 23 FOCS
, pp. 80-91
-
-
Yao, A.1
-
50
-
-
0003113271
-
How to Generate and Exchange Secrets
-
A. Yao, “How to Generate and Exchange Secrets,” Proc. of the 27 FOCS (1986).
-
(1986)
Proc. of the 27 FOCS
-
-
Yao, A.1
|