-
2
-
-
85029503150
-
Secure Multiparty Protocols and Zero Knowledge Proof Systems Tolerating a Faulty Minority
-
To appear, J. Cryptology. An earlier version appeared as “Secure Multiparty Protocols Tolerating Half Faulty Processors.”, ACM
-
D. Beaver. “Secure Multiparty Protocols and Zero Knowledge Proof Systems Tolerating a Faulty Minority.” To appear, J. Cryptology. An earlier version appeared as “Secure Multiparty Protocols Tolerating Half Faulty Processors.” Proceedings of Crypto 1989, ACM, 1989.
-
(1989)
Proceedings of Crypto 1989
-
-
Beaver, D.1
-
3
-
-
85029476217
-
Formal Definitions for Secure Distributed Protocols
-
Princeton, NJ, October, J. Feigenbaum, M. Merritt (eds.)
-
D. Beaver. “Formal Definitions for Secure Distributed Protocols.” Proceedings of the DIMACS Workshop on Distributed Computing and Cryptography, Princeton, NJ, October, 1989, J. Feigenbaum, M. Merritt (eds.).
-
(1989)
Proceedings of the DIMACS Workshop on Distributed Computing and Cryptography
-
-
Beaver, D.1
-
4
-
-
4243132035
-
-
PhD Thesis, Harvard University, Cambridge
-
D. Beaver. Security, Fault Tolerance, and Communication Complexity in Distributed Systems. PhD Thesis, Harvard University, Cambridge, 1990.
-
(1990)
Security, Fault Tolerance, and Communication Complexity in Distributed Systems
-
-
Beaver, D.1
-
6
-
-
85029491129
-
Cryptographic Protocols Provably Secure Against Dynamic Adversaries
-
D. Beaver, S. Haber. “Cryptographic Protocols Provably Secure Against Dynamic Adversaries.” Submitted to FOCS 91.
-
Submitted to FOCS
, pp. 91
-
-
Beaver, D.1
Haber, S.2
-
8
-
-
84898960610
-
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
-
ACM
-
M. Ben-Or, S. Goldwasser, A. Wigderson. “Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation.” Proceedings of the 20th STOC, ACM, 1988, 1-10.
-
(1988)
Proceedings of the 20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
9
-
-
0019669520
-
Security Proofs for Information Protection Systems
-
IEEE Computer Society Press, New York
-
R. Blakley. “Security Proofs for Information Protection Systems.” Proceedings of the 1980 Symposium on Security and Privacy, IEEE Computer Society Press, New York, 1981, 79-88.
-
(1981)
Proceedings of the 1980 Symposium on Security and Privacy
, pp. 79-88
-
-
Blakley, R.1
-
12
-
-
84976655650
-
Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model
-
Springer-Verlag
-
Z. Galil, S. Haber, M. Yung. “Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model.” Proceedings of Crypto 1987, Springer-Verlag, 1988, 135-155.
-
(1988)
Proceedings of Crypto 1987
, pp. 135-155
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
13
-
-
0024716009
-
Minimum-Knowledge Interactive Proofs for Decision Problems
-
Z. Galil, S. Haber, and M. Yung. “Minimum-Knowledge Interactive Proofs for Decision Problems.” SIAM J. Comput. 18: 4 (1989), 711-739.
-
(1989)
SIAM J. Comput
, vol.18
, Issue.4
, pp. 711-739
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
14
-
-
33747194089
-
Fair Computation of General Functions in Presence of Immoral Majority
-
S. Goldwasser, L. Levin. “Fair Computation of General Functions in Presence of Immoral Majority.” Proceedings of Crypto 1990.
-
Proceedings of Crypto 1990
-
-
Goldwasser, S.1
Levin, L.2
-
16
-
-
0024611659
-
The Knowledge Complexity of Interactive Proof Systems
-
S. Goldwasser, S. Micali, C. Rackoff. “The Knowledge Complexity of Interactive Proof Systems.” SIAM J. Comput. 18: 1 (1989), 186-208.
-
(1989)
SIAM J. Comput
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
18
-
-
0022914590
-
Proofs that Yield Nothing but Their Validity and a Methodology of Cryptographic Protocol Design
-
IEEE
-
O. Goldreich, S. Micali, A. Wigderson. “Proofs that Yield Nothing but Their Validity and a Methodology of Cryptographic Protocol Design.” Proceedings of the 27th FOCS, IEEE, 1986, 174-187.
-
(1986)
Proceedings of the 27th FOCS
, pp. 174-187
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
19
-
-
0023545076
-
How to Play Any Mental Game, or A Completeness Theorem for Protocols with Honest Majority
-
ACM
-
O. Goldreich, S. Micali, A. Wigderson. “How to Play Any Mental Game, or A Completeness Theorem for Protocols with Honest Majority.” Proceedings of the 19th STOC, ACM, 1987, 218-229.
-
(1987)
Proceedings of the 19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
23
-
-
0023601199
-
On the Cunning Power of Cheating Verifiers: Some Observations about Zero Knowledge Proofs
-
ACM
-
Y. Oren. “On the Cunning Power of Cheating Verifiers: Some Observations about Zero Knowledge Proofs.” Proceedings of the 19th STOC, ACM, 1987, 462-471.
-
(1987)
Proceedings of the 19th STOC
, pp. 462-471
-
-
Oren, Y.1
-
24
-
-
0024859552
-
Verifiable Secret Sharing and Multiparty Protocols with Honest Majority
-
ACM
-
T. Rabin, M. Ben-Or. “Verifiable Secret Sharing and Multiparty Protocols with Honest Majority.” Proceedings of the 21st STOC, ACM, 1989, 73-85.
-
(1989)
Proceedings of the 21st STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
25
-
-
0018545449
-
How to Share a Secret
-
A. Shamir. “How to Share a Secret.” Communications of the ACM, 22 (1979), 612-613.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
26
-
-
0020301290
-
Theory and Applications of Trapdoor Functions
-
IEEE
-
A. Yao, “Theory and Applications of Trapdoor Functions.” Proceedings of the 23rd FOCS, IEEE, 1982, 80-91.
-
(1982)
Proceedings of the 23rd FOCS
, pp. 80-91
-
-
Yao, A.1
-
27
-
-
0022882770
-
How to Generate and Exchange Secrets
-
IEEE
-
A. Yao. “How to Generate and Exchange Secrets.” Proceedings of the 27th FOCS, IEEE, 1986, 162-167.
-
(1986)
Proceedings of the 27th FOCS
, pp. 162-167
-
-
Yao, A.1
|