On Fully Secure MPC with Solitary Output
暂无分享,去创建一个
Yuval Ishai | Eyal Kushilevitz | Shai Halevi | Tal Rabin | Nikolaos Makriyannis | S. Halevi | T. Rabin | E. Kushilevitz | Y. Ishai | Nikolaos Makriyannis
[1] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[2] Eyal Kushilevitz,et al. Privacy and communication complexity , 1989, 30th Annual Symposium on Foundations of Computer Science.
[3] Vanesa Daza,et al. Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions , 2017, TCC.
[4] Jonathan Katz. On achieving the "best of both worlds" in secure multiparty computation , 2007, STOC '07.
[5] Leonid A. Levin,et al. Fair Computation of General Functions in Presence of Immoral Majority , 1990, CRYPTO.
[6] Andrew Chi-Chih Yao,et al. How to Generate and Exchange Secrets (Extended Abstract) , 1986, FOCS.
[7] Avi Wigderson,et al. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract) , 1988, STOC.
[8] Jonathan Katz,et al. Complete Fairness in Multi-Party Computation Without an Honest Majority , 2009, IACR Cryptol. ePrint Arch..
[9] Manoj Prabhakaran,et al. Towards Characterizing Securely Computable Two-Party Randomized Functions , 2018, Public Key Cryptography.
[10] Eran Omri,et al. Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions , 2015, TCC.
[11] Anat Paskin-Cherniavsky,et al. Non-Interactive Secure Multiparty Computation , 2014, IACR Cryptol. ePrint Arch..
[12] Yuval Ishai,et al. On 2-Round Secure Multiparty Computation , 2002, CRYPTO.
[13] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[14] Donald Beaver,et al. Multiparty Protocols Tolerating Half Faulty Processors , 1989, CRYPTO.
[15] Yehuda Lindell,et al. Complete Fairness in Secure Two-Party Computation , 2011, JACM.
[16] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[17] Silvio Micali,et al. How to play any mental game, or a completeness theorem for protocols with honest majority , 2019, Providing Sound Foundations for Cryptography.
[18] Moni Naor,et al. A minimal model for secure computation (extended abstract) , 1994, STOC '94.
[19] Eyal Kushilevitz,et al. A zero-one law for Boolean privacy , 1989, STOC '89.
[20] Yehuda Lindell,et al. On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation , 2006, CRYPTO.
[21] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[22] Nikolaos Makriyannis. On the Classification of Finite Boolean Functions up to Fairness , 2014, SCN.
[23] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[24] Yehuda Lindell,et al. Secure Multi-Party Computation without Agreement , 2005, Journal of Cryptology.
[25] Donald Beaver,et al. Multiparty Computation with Faulty Majority , 1989, CRYPTO.
[26] Yehuda Lindell,et al. Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation , 2014, Journal of Cryptology.
[27] Manoj Prabhakaran,et al. Uncovering Algebraic Structures in the MPC Landscape , 2019, IACR Cryptol. ePrint Arch..
[28] Gilad Asharov,et al. Towards Characterizing Complete Fairness in Secure Two-Party Computation , 2014, IACR Cryptol. ePrint Arch..
[29] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[30] Yehuda Lindell,et al. Secure Two-Party Computation with Fairness - A Necessary Design Principle , 2017, IACR Cryptol. ePrint Arch..
[31] Richard Cleve,et al. Limits on the security of coin flips when half the processors are faulty , 1986, STOC '86.
[32] Rafail Ostrovsky,et al. Minimal Complete Primitives for Secure Multi-party Computation , 2001, CRYPTO.