메뉴 건너뛰기




Volumn 293 LNCS, Issue , 1988, Pages 135-155

Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model

Author keywords

[No Author keywords available]

Indexed keywords

FAULT TOLERANCE;

EID: 84976655650     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48184-2_10     Document Type: Conference Paper
Times cited : (74)

References (42)
  • 3
    • 0009011118 scopus 로고
    • Bounded-Width Polynomial-Size Branching Programs Recognize Exactly Those Languages in NC1
    • ACM, May
    • Barrington, D.A. Bounded-Width Polynomial-Size Branching Programs Recognize Exactly Those Languages in NC1. 18th STOC, ACM, May, 1986, pp. 1-5.
    • (1986) 18Th STOC , pp. 1-5
    • Barrington, D.A.1
  • 5
    • 84883938043 scopus 로고
    • Distributing the Power of a Government to Enhance the Privacy of Voters
    • Benaloh, J.C. and Yung M. Distributing the Power of a Government to Enhance the Privacy of Voters. Proc. 5th PODC, ACM, 1986, pp. 52-62.
    • (1986) Proc. 5Th PODC, ACM , pp. 52-62
    • Benaloh, J.C.1    Yung, M.2
  • 6
    • 0021522644 scopus 로고
    • How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits
    • 1982, pp. 112-117. Also in: SIAM Journal on Computing, November
    • Blum, M. and Micali, S. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. Proc. 23rd FOCS, IEEE, 1982, pp. 112-117. Also in: SIAM Journal on Computing, November 1984, 850-864.
    • (1984) Proc. 23Rd FOCS, IEEE , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 7
    • 84949995981 scopus 로고
    • An Efficient Probabilistic Public-Key Scheme Which Hides All Partial Information
    • Blum, M. and S. Goldwasser. An Efficient Probabilistic Public-Key Scheme Which Hides All Partial Information. Proceedings of Crypto84, 1985, pp. 289-301.
    • (1985) Proceedings of Crypto84 , pp. 289-301
    • Blum, M.1    Goldwasser, S.2
  • 8
    • 0020932981 scopus 로고
    • Comparison of Two Pseudo-Random Number Generators
    • August
    • Blum, L., Blum M. and Shub M. Comparison of Two Pseudo-Random Number Generators. Proceedings of Crypto82, August, 1982, pp. 61-78.
    • (1982) Proceedings of Crypto82 , pp. 61-78
    • Blum, L.1    Blum, M.2    Shub, M.3
  • 9
    • 84976804419 scopus 로고
    • How to Exchange (Secret) Keys
    • May
    • Blum, M. “How to Exchange (Secret) Keys”. ACM Transactions on Computer System 1,2 (May 1983), 175-193.
    • (1983) ACM Transactions on Computer System , vol.1 , Issue.2 , pp. 175-193
    • Blum, M.1
  • 10
    • 85032175280 scopus 로고
    • Pseudorandom Generators and Complexity Classes
    • Boppana, R.B. and R. Hirschfeld. Pseudorandom Generators and Complexity Classes. Preprint, 1986.
    • (1986) Preprint
    • Boppana, R.B.1    Hirschfeld, R.2
  • 13
    • 0022199386 scopus 로고
    • Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults. Proc. 26th FOCS
    • Chor, B., Goldwasser S., Micali S. and Awerbuch B. Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults. Proc. 26th FOCS, IEEE, 1985, pp. 383-395.
    • (1985) IEEE , pp. 383-395
    • Chor, B.1    Goldwasser, S.2    Micali, S.3    Awerbuch, B.4
  • 14
    • 0022188127 scopus 로고
    • A Robust and Verifiable Cryptographically Secure Election Scheme
    • Cohen, J.C. (Benaloh) and Fischer M.J. A Robust and Verifiable Cryptographically Secure Election Scheme. Proc. 26th FOCS, IEEE, 1985, pp. 372-383.
    • (1985) Proc. 26Th FOCS, IEEE , pp. 372-383
    • Cohen, J.C.1    Fischer, M.J.2
  • 15
    • 84976671974 scopus 로고
    • Cryptographic Protocols
    • ACM-SIGACT, May
    • DeMillo, R.A., N. Lynch and M. Merritt. Cryptographic Protocols. 14th STOC, ACM-SIGACT, May, 1982, pp. 383-400.
    • (1982) 14Th STOC , pp. 383-400
    • Demillo, R.A.1    Lynch, N.2    Merritt, M.3
  • 17
    • 0022080529 scopus 로고
    • A Randomized Protocol for Signing Contracts
    • June
    • Even, S., Goldreich O. and Lempel A. “A Randomized Protocol for Signing Contracts”. Communications of the ACM 28,6 (June 1985), 637-647.
    • (1985) Communications of the ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 18
    • 0023569922 scopus 로고
    • Zero-Knowledge Proofs of Identity
    • Feige, U., A. Fiat and A. Shamir. Zero-Knowledge Proofs of Identity. 19th STOC, 1986, pp. 210-217.
    • (1986) 19Th STOC , pp. 210-217
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 20
    • 0022238417 scopus 로고
    • Private Interactive Test of a Boolean Predicate and Minimum-Knowledge Public-Key Cqposystems
    • Galil, Z., Haber S. and Yung M. A private Interactive Test of a Boolean Predicate and Minimum-Knowledge Public-Key Cqposystems. Proc. 26th FOCS, IEEE, 1985, pp. 360-371.
    • (1985) Proc. 26Th FOCS, IEEE , pp. 360-371
    • Galil, Z.1    Haber, S.2    Yung, M.A.3
  • 23
    • 0022914590 scopus 로고
    • Proofs that Yield Nothing But their Validity and a Methodology of Cryptogrphic Protocol Design
    • October
    • Goldreich, O., S. Micali and A. Wigderson. Proofs that Yield Nothing But their Validity and a Methodology of Cryptogrphic Protocol Design. 27th FOCS, IEEE, October, 1986, pp. 174-187.
    • (1986) 27Th FOCS, IEEE , pp. 174-187
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 25
    • 85050160774 scopus 로고
    • Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information
    • ACM-SIGACT, May
    • Goldwasser, S. and Micali S. Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information. Proceedings of the 14th Annual ACM Symp. on Theory of Computing, ACM-SIGACT, May, 1982, pp. 365-377.
    • (1982) Proceedings of the 14Th Annual ACM Symp. on Theory of Computing , pp. 365-377
    • Goldwasser, S.1    Micali, S.2
  • 31
    • 85032220184 scopus 로고
    • One-way Functions and Pseudorandom Generators
    • Levin, L. One-way Functions and Pseudorandom Generators. Proc. 17th STOC, ACM, 1985.
    • (1985) Proc. 17Th STOC, ACM
    • Levin, L.1
  • 33
    • 0018456413 scopus 로고
    • Relations among Complexity Measures
    • Pippenger, N., and M.J. Fischer. “Relations among Complexity Measures”. Journal of the ACM 26 (1979), 361-381.
    • (1979) Journal of the ACM , vol.26 , pp. 361-381
    • Pippenger, N.1    Fischer, M.J.2
  • 35
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public Key Cryptosystems
    • February
    • Rivest, R., Shamir A., Adleman L. “A Method for Obtaining Digital Signatures and Public Key Cryptosystems”. Commications of the ACM 21,2 (February 1978), 120-126.
    • (1978) Commications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 36
    • 0018545449 scopus 로고
    • How to Share a Secret
    • November
    • Shamir, A. “How to Share a Secret”. Communicarions of the ACM 22,11 (November 1979), 612-613.
    • (1979) Communicarions of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 37
    • 3042680831 scopus 로고
    • Mental Poker
    • Mathematical Gardner. Klarner D. E., Ed
    • Shamir, A., Rivest R. Adleman L. Mental Poker. In Mathematical Gardner. Klarner D. E., Ed., Wadsworth Intrntl, 1981, pp. 37-43.
    • (1981) Wadsworth Intrntl , pp. 37-43
    • Shamir, A.1    Rivest, R.2    Adleman, L.3
  • 38
    • 0021548502 scopus 로고
    • Efficient and Secure Pseudo-Random Number Generation
    • Vazirani, U. and Vazirani V. Efficient and Secure Pseudo-Random Number Generation. Proc. 25th FOCS, IEEE, 1984, pp. 458-463.
    • (1984) Proc. 25Th FOCS, IEEE , pp. 458-463
    • Vazirani, U.1    Vazirani, V.2
  • 39
    • 0020918124 scopus 로고
    • Trapdoor Pseudo-random Number Generators, with Applications to Protocol Design
    • November
    • Vazirani, U. and Vazirani V. Trapdoor Pseudo-random Number Generators, with Applications to Protocol Design. 24th FOCS, IEEE, November, 1983, pp. 23-30.
    • (1983) 24Th FOCS, IEEE , pp. 23-30
    • Vazirani, U.1    Vazirani, V.2
  • 40
    • 0020312165 scopus 로고
    • Protocols for Secure Computations
    • IEEE, November
    • Yao, A. Protocols for Secure Computations. 23rd FOCS, IEEE, November, 1982, pp. 160-164.
    • (1982) 23Rd FOCS , pp. 160-164
    • Yao, A.1
  • 41
    • 0020301290 scopus 로고
    • Theory and Applications of Trapdoor Functions
    • IEEE, November
    • Yao, A. Theory and Applications of Trapdoor Functions. 23rd FOCS, IEEE, November, 1982, pp. 80-91.
    • (1982) 23Rd FOCS , pp. 80-91
    • Yao, A.1
  • 42
    • 0022882770 scopus 로고
    • How to Generate and Exchange Secrets
    • IEEE, October
    • Yao, A. How to Generate and Exchange Secrets. 27th FOCS, IEEE, October, 1986, pp. 162-167.
    • (1986) 27Th FOCS , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.