Topology-Hiding Computation on All Graphs
暂无分享,去创建一个
[1] Anat Paskin-Cherniavsky,et al. Non-Interactive Secure Multiparty Computation , 2014, IACR Cryptol. ePrint Arch..
[2] J. Dall,et al. Random geometric graphs. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[3] Thomas Sauerwald,et al. Diameter and Broadcast Time of Random Geometric Graphs in Arbitrary Dimensions , 2011, Algorithmica.
[4] Ueli Maurer,et al. Network-Hiding Communication and Applications to Multi-Party Protocols , 2016, IACR Cryptol. ePrint Arch..
[5] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[6] Gregory J. Pottie,et al. Wireless integrated network sensors , 2000, Commun. ACM.
[7] Prabhakar Raghavan,et al. The electrical resistance of a graph captures its commute and cover times , 2005, computational complexity.
[8] L. Asz. Random Walks on Graphs: a Survey , 2022 .
[9] Amit Sahai,et al. Multi-Input Functional Encryption , 2014, IACR Cryptol. ePrint Arch..
[10] S. Rajsbaum. Foundations of Cryptography , 2014 .
[11] Silas Richelson,et al. Topology-Hiding Computation , 2015, TCC.
[12] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[13] Tal Moran,et al. Topology-Hiding Computation Beyond Logarithmic Diameter , 2017, EUROCRYPT.
[14] Eric Allender,et al. On traversal sequences, exploration sequences and completeness of kolmogorov random strings , 2003 .
[15] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[16] Rafail Ostrovsky,et al. The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults , 2015, ITCS.
[17] Andreas Jakoby,et al. Communications in Unknown Networks: Preserving the Secret of Topology , 2005, SIROCCO.
[18] Richard J. Lipton,et al. Random walks, universal traversal sequences, and the complexity of maze problems , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).
[19] Eli Upfal,et al. Probability and Computing: Randomized Algorithms and Probabilistic Analysis , 2005 .
[20] Yuval Ishai,et al. Secure Multiparty Computation with General Interaction Patterns , 2016, IACR Cryptol. ePrint Arch..
[21] Yehuda Lindell,et al. Secure Computation on the Web: Computing without Simultaneous Interaction , 2011, IACR Cryptol. ePrint Arch..
[22] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[23] Mohammed Abdullah,et al. The Cover Time of Random Walks on Graphs , 2012, ArXiv.
[24] Avi Wigderson,et al. Universal Traversal Sequences for Expander Graphs , 1993, Inf. Process. Lett..
[25] Michael Krivelevich,et al. Submitted to the Annals of Applied Probability HAMILTON CYCLES IN RANDOM GEOMETRIC GRAPHS By , 2010 .
[26] Satish Kumar,et al. Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.
[27] Omer Reingold,et al. Undirected connectivity in log-space , 2008, JACM.