메뉴 건너뛰기




Volumn 293 LNCS, Issue , 1988, Pages 73-86

How to solve any protocol problem - An efficiency improvement

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; EFFICIENCY; POLYNOMIAL APPROXIMATION; TURING MACHINES;

EID: 85032194875     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48184-2_6     Document Type: Conference Paper
Times cited : (92)

References (12)
  • 1
    • 0009011118 scopus 로고
    • Bounded-Width Polynomial-Size Branching Programs Recognize Exactly Those Languages in NC 1
    • Barrington, D.A., “Bounded-Width Polynomial-Size Branching Programs Recognize Exactly Those Languages in NC 1”, Proc. 18th STOC, 1986, pp. 1–5.
    • (1986) Proc. 18Th STOC , pp. 1-5
    • Barrington, D.A.1
  • 2
    • 0022199386 scopus 로고
    • Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults
    • Chor, B., S. Goldwasser, S. Micali, and B. Awerbuch. “Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults”, Proc. 26th FOCS, 1985, pp. 383–395.
    • (1985) Proc. 26Th FOCS , pp. 383-395
    • Chor, B.1    Goldwasser, S.2    Micali, S.3    Awerbuch, B.4
  • 3
    • 85032196823 scopus 로고
    • technical report YALEU/DCS/TR-453. Yale University, Dept. of Computer Science, Feb. 1986. Presented in Crypto86
    • Cohen, J.D., “Secret Sharing Homomorphisms: Keeping Shares of a Secret”, technical report YALEU/DCS/TR-453. Yale University, Dept. of Computer Science, Feb. 1986. Presented in Crypto86, 1986.
    • (1986) Secret Sharing Homomorphisms: Keeping Shares of a Secret
    • Cohen, J.D.1
  • 4
    • 0017018484 scopus 로고
    • New Directions in Cryptography
    • November
    • Diffie, W., and M.E. Hellman, “New Directions in Cryptography”, IEEE Tram. on Inform. Theory, Vol. IT-22, No. 6, November 1976, pp. 644–654.
    • (1976) IEEE Tram. on Inform. Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 5
    • 0022080529 scopus 로고
    • A Randomized Protocol for Signing Contracts
    • Even, S., O. Goldreich, and A. Lempel, “A Randomized Protocol for Signing Contracts”. CACM, Vol. 28. No. 6, 1985. pp. 637–647.
    • (1985) CACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 6
    • 85030325645 scopus 로고
    • Proofs that Yield Nothing But their Validity and a Methodology of Cryptographic Protocol Design
    • Goldreich, O., S. Micali, and A. Wigderson, “Proofs that Yield Nothing But their Validity and a Methodology of Cryptographic Protocol Design”, Proc. 27th FOCS, 1986.
    • (1986) Proc. 27Th FOCS
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 7
    • 0002337124 scopus 로고
    • How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority
    • Goldreich, O., S. Micali, and A. Wigderson, “How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority”, Proc. 19th STOC, 1987.
    • (1987) Proc. 19Th STOC
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 8
    • 0021409284 scopus 로고
    • Probabilistic Encryption
    • Goldwasser, S., and S. Micali, “Probabilistic Encryption”, JCSS, Vol. 28, No. 2, 1984, pp. 270–299.
    • (1984) JCSS , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 9
    • 0021941417 scopus 로고
    • Knowledge Complexity of Interactive Proofs
    • Goldwasser, S., S. Micali, and C. Rackoff, “Knowledge Complexity of Interactive Proofs”, Proc. 17th STOC, 1985, pp. 291–304.
    • (1985) Proc. 17Th STOC , pp. 291-304
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 12
    • 0003113271 scopus 로고
    • How to Generate and Exchange Secrets
    • Yao, A.C., “How to Generate and Exchange Secrets”, Proc. 27th FOCS, 1986.
    • (1986) Proc. 27Th FOCS
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.