Simple and Efficient Perfectly-Secure Asynchronous MPC
暂无分享,去创建一个
[1] David Chaum,et al. Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result , 1987, CRYPTO.
[2] Cynthia Dwork,et al. Advances in Cryptology – CRYPTO 2020: 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III , 2020, Annual International Cryptology Conference.
[3] Ran Canetti,et al. Studies in secure multiparty computation and applications , 1995 .
[4] Tatsuaki Okamoto,et al. Advances in Cryptology — ASIACRYPT 2000 , 2000, Lecture Notes in Computer Science.
[5] Donald Beaver,et al. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority , 2004, Journal of Cryptology.
[6] Martin Hirt,et al. Cryptographic Asynchronous Multi-party Computation with Optimal Resilience (Extended Abstract) , 2005, EUROCRYPT.
[7] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[8] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[9] Ueli Maurer,et al. Efficient Secure Multi-party Computation , 2000, ASIACRYPT.
[10] Carl Pomerance,et al. Advances in Cryptology — CRYPTO ’87 , 2000, Lecture Notes in Computer Science.
[11] Martin Hirt,et al. Robust Multiparty Computation with Linear Communication Complexity , 2006, CRYPTO.
[12] K. Srinathan,et al. Asynchronous Unconditionally Secure Computation: An Efficiency Improvement , 2002, INDOCRYPT.
[13] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[14] K. Srinathan,et al. Efficient Asynchronous Secure Multiparty Distributed Computation , 2000, INDOCRYPT.
[15] Tal Rabin,et al. Asynchronous secure computations with optimal resilience (extended abstract) , 1994, PODC '94.
[16] Ran Canetti,et al. Asynchronous secure computation , 1993, STOC.
[17] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[18] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[19] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[20] Alfred Menezes,et al. Progress in Cryptology — INDOCRYPT 2002 , 2002, Lecture Notes in Computer Science.
[21] Bimal Roy,et al. Progress in Cryptology —INDOCRYPT 2000 , 2002, Lecture Notes in Computer Science.
[22] Moti Yung,et al. Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model , 1987, CRYPTO.
[23] Adi Shamir,et al. How to share a secret , 1979, CACM.
[24] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[25] Martin Hirt,et al. Efficient Multi-party Computation with Dispute Control , 2006, TCC.
[26] Gabriel Bracha,et al. An asynchronous [(n - 1)/3]-resilient consensus protocol , 1984, PODC '84.