Comparing information without leaking it
暂无分享,去创建一个
[1] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[2] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[3] Gilles Brassard,et al. All-or-Nothing Disclosure of Secrets , 1986, CRYPTO.
[4] Silvio Micali,et al. A fair protocol for signing contracts , 1990, IEEE Trans. Inf. Theory.
[5] Joe Kilian,et al. Discreet Solitary Games , 1994, CRYPTO.
[6] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[7] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[8] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[9] Richard Cleve,et al. Controlled Gradual Disclosure Schemes for Random Bits and Their Applications , 1989, CRYPTO.
[10] Eyal Kushilevitz,et al. A zero-one law for Boolean privacy , 1989, STOC '89.
[11] David A. Mix Barrington,et al. Bounded-width polynomial-size branching programs recognize exactly those languages in NC1 , 1986, STOC '86.
[12] Joe Kilian,et al. Uses of randomness in algorithms and protocols , 1990 .
[13] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[14] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[15] Rolf Herken,et al. The Universal Turing Machine: A Half-Century Survey , 1992 .
[16] Michael O. Rabin,et al. Transaction Protection by Beacons , 1983, J. Comput. Syst. Sci..
[17] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[18] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[19] Moni Naor,et al. A minimal model for secure computation (extended abstract) , 1994, STOC '94.