Multiparty Computation from Threshold Homomorphic Encryption
暂无分享,去创建一个
[1] Jirí Srba,et al. Matching Modulo Associativity and Idempotency Is NP-Complete , 2000, MFCS.
[2] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[3] Silvio Micali,et al. Secure Computation (Abstract) , 1991, CRYPTO.
[4] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[5] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[6] Andrew Chi-Chih Yao,et al. Theory and Applications of Trapdoor Functions (Extended Abstract) , 1982, FOCS.
[7] Michael Luby,et al. Pseudorandomness and cryptographic applications , 1996, Princeton computer science notes.
[8] Ulrich Kohlenbach,et al. Effective Uniform Bounds on the Krasnoselski-Mann Iteration , 2000 .
[9] Stefan Dantchev,et al. A Tough Nut for Tree Resolution , 2000 .
[10] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[11] Avi Wigderson,et al. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract) , 1988, STOC.
[12] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[13] Ivan Damgård,et al. Practical Threshold RSA Signatures Without a Trusted Dealer , 2000 .
[14] Ueli Maurer,et al. Efficient Secure Multi-party Computation , 2000, ASIACRYPT.
[15] J'anos Simon,et al. Proceedings of the twentieth annual ACM symposium on Theory of computing , 1988, STOC 1988.
[16] Victor Shoup,et al. Practical Threshold Signatures , 2000, EUROCRYPT.
[17] Rasmus Pagh. A New Trade-Off for Deterministic Dictionaries , 2000, SWAT.
[18] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[19] Matthew K. Franklin,et al. Joint Encryption and Message-Efficient Secure Computation , 1993, CRYPTO.
[20] K. Kurosawa. Zero knowledge interactive proof system for modulo operations , 1991 .
[21] Judit Bar-Ilan,et al. Non-cryptographic fault-tolerant computing in constant number of rounds of interaction , 1989, PODC '89.
[22] Ivan Damgård,et al. Efficient Protocols based on Probabilistic Encryption using Composite Degree Residue Classes , 2000, IACR Cryptol. ePrint Arch..
[23] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[24] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[25] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[26] Tal Rabin,et al. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography , 1998, PODC '98.
[27] Ivan Damgård,et al. Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free? , 1998, CRYPTO.
[28] Ivan Damgård,et al. Improved Non-committing Encryption Schemes Based on a General Complexity Assumption , 2000, CRYPTO.
[29] Ueli Maurer,et al. General Secure Multi-party Computation from any Linear Secret-Sharing Scheme , 2000, EUROCRYPT.
[30] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[31] Donald Beaver,et al. Foundations of Secure Interactive Computing , 1991, CRYPTO.
[32] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[33] Jacques Stern,et al. Sharing Decryption in the Context of Voting or Lotteries , 2000, Financial Cryptography.
[34] Ivan Damgård,et al. Zero-Knowledge Proofs for Finite Field Arithmetic or: Can Zero-Knowledge be for Free? , 1997 .
[35] Oded Goldreich,et al. How to Solve any Protocol Problem - An Efficiency Improvement , 1987, CRYPTO.
[36] Markus Jakobsson,et al. Mix and Match: Secure Function Evaluation via Ciphertexts , 2000, ASIACRYPT.
[37] R. Cramer,et al. Multiparty Computation from Threshold Homomorphic Encryption , 2000 .
[38] Nabil H. Mustafa,et al. Democratic Consensus and the Local Majority Rule , 2000 .