메뉴 건너뛰기




Volumn 576 LNCS, Issue , 1992, Pages 377-391

Foundations of secure interactive computing

Author keywords

[No Author keywords available]

Indexed keywords

COMPLEX NETWORKS; CRYPTOGRAPHY;

EID: 85029542707     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-46766-1_31     Document Type: Conference Paper
Times cited : (155)

References (27)
  • 2
    • 85029503150 scopus 로고
    • Secure Multiparty Protocols and Zero Knowledge Proof Systems Tolerating a Faulty Minority
    • To appear, J. Cryptology. An earlier version appeared as “Secure Multiparty Protocols Tolerating Half Faulty Processors.”, ACM
    • D. Beaver. “Secure Multiparty Protocols and Zero Knowledge Proof Systems Tolerating a Faulty Minority.” To appear, J. Cryptology. An earlier version appeared as “Secure Multiparty Protocols Tolerating Half Faulty Processors.” Proceedings of Crypto 1989, ACM, 1989.
    • (1989) Proceedings of Crypto 1989
    • Beaver, D.1
  • 6
    • 85029491129 scopus 로고    scopus 로고
    • Cryptographic Protocols Provably Secure Against Dynamic Adversaries
    • D. Beaver, S. Haber. “Cryptographic Protocols Provably Secure Against Dynamic Adversaries.” Submitted to FOCS 91.
    • Submitted to FOCS , pp. 91
    • Beaver, D.1    Haber, S.2
  • 8
    • 84898960610 scopus 로고
    • Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
    • ACM
    • M. Ben-Or, S. Goldwasser, A. Wigderson. “Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation.” Proceedings of the 20th STOC, ACM, 1988, 1-10.
    • (1988) Proceedings of the 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 9
    • 0019669520 scopus 로고
    • Security Proofs for Information Protection Systems
    • IEEE Computer Society Press, New York
    • R. Blakley. “Security Proofs for Information Protection Systems.” Proceedings of the 1980 Symposium on Security and Privacy, IEEE Computer Society Press, New York, 1981, 79-88.
    • (1981) Proceedings of the 1980 Symposium on Security and Privacy , pp. 79-88
    • Blakley, R.1
  • 12
    • 84976655650 scopus 로고
    • Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model
    • Springer-Verlag
    • Z. Galil, S. Haber, M. Yung. “Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model.” Proceedings of Crypto 1987, Springer-Verlag, 1988, 135-155.
    • (1988) Proceedings of Crypto 1987 , pp. 135-155
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 13
    • 0024716009 scopus 로고
    • Minimum-Knowledge Interactive Proofs for Decision Problems
    • Z. Galil, S. Haber, and M. Yung. “Minimum-Knowledge Interactive Proofs for Decision Problems.” SIAM J. Comput. 18: 4 (1989), 711-739.
    • (1989) SIAM J. Comput , vol.18 , Issue.4 , pp. 711-739
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 14
    • 33747194089 scopus 로고    scopus 로고
    • Fair Computation of General Functions in Presence of Immoral Majority
    • S. Goldwasser, L. Levin. “Fair Computation of General Functions in Presence of Immoral Majority.” Proceedings of Crypto 1990.
    • Proceedings of Crypto 1990
    • Goldwasser, S.1    Levin, L.2
  • 16
    • 0024611659 scopus 로고
    • The Knowledge Complexity of Interactive Proof Systems
    • S. Goldwasser, S. Micali, C. Rackoff. “The Knowledge Complexity of Interactive Proof Systems.” SIAM J. Comput. 18: 1 (1989), 186-208.
    • (1989) SIAM J. Comput , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 18
    • 0022914590 scopus 로고
    • Proofs that Yield Nothing but Their Validity and a Methodology of Cryptographic Protocol Design
    • IEEE
    • O. Goldreich, S. Micali, A. Wigderson. “Proofs that Yield Nothing but Their Validity and a Methodology of Cryptographic Protocol Design.” Proceedings of the 27th FOCS, IEEE, 1986, 174-187.
    • (1986) Proceedings of the 27th FOCS , pp. 174-187
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 19
    • 0023545076 scopus 로고
    • How to Play Any Mental Game, or A Completeness Theorem for Protocols with Honest Majority
    • ACM
    • O. Goldreich, S. Micali, A. Wigderson. “How to Play Any Mental Game, or A Completeness Theorem for Protocols with Honest Majority.” Proceedings of the 19th STOC, ACM, 1987, 218-229.
    • (1987) Proceedings of the 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 23
    • 0023601199 scopus 로고
    • On the Cunning Power of Cheating Verifiers: Some Observations about Zero Knowledge Proofs
    • ACM
    • Y. Oren. “On the Cunning Power of Cheating Verifiers: Some Observations about Zero Knowledge Proofs.” Proceedings of the 19th STOC, ACM, 1987, 462-471.
    • (1987) Proceedings of the 19th STOC , pp. 462-471
    • Oren, Y.1
  • 24
    • 0024859552 scopus 로고
    • Verifiable Secret Sharing and Multiparty Protocols with Honest Majority
    • ACM
    • T. Rabin, M. Ben-Or. “Verifiable Secret Sharing and Multiparty Protocols with Honest Majority.” Proceedings of the 21st STOC, ACM, 1989, 73-85.
    • (1989) Proceedings of the 21st STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 25
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir. “How to Share a Secret.” Communications of the ACM, 22 (1979), 612-613.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 26
    • 0020301290 scopus 로고
    • Theory and Applications of Trapdoor Functions
    • IEEE
    • A. Yao, “Theory and Applications of Trapdoor Functions.” Proceedings of the 23rd FOCS, IEEE, 1982, 80-91.
    • (1982) Proceedings of the 23rd FOCS , pp. 80-91
    • Yao, A.1
  • 27
    • 0022882770 scopus 로고
    • How to Generate and Exchange Secrets
    • IEEE
    • A. Yao. “How to Generate and Exchange Secrets.” Proceedings of the 27th FOCS, IEEE, 1986, 162-167.
    • (1986) Proceedings of the 27th FOCS , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.