Secure Distributed Computing: Theory and Practice
暂无分享,去创建一个
[1] Claude Crépeau,et al. A Zero-Knowledge Poker Protocol That Achieves Confidentiality of the Players' Strategy or How to Achieve an Electronic Poker Face , 1986, CRYPTO.
[2] Rafail Ostrovsky,et al. Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract) , 1992, CRYPTO.
[3] Niels Ferguson,et al. Extensions of Single-term Coins , 1993, CRYPTO.
[4] Edsger W. Dijkstra,et al. Self-stabilizing systems in spite of distributed control , 1974, CACM.
[5] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[6] Lenore Cowen,et al. On the Structure of Secret Key Exchange Protocols , 1989, Distributed Computing And Cryptography.
[7] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[8] Matthew K. Franklin,et al. Eavesdropping games: a graph-theoretic approach to privacy in distributed systems , 1993, Proceedings of 1993 IEEE 34th Annual Foundations of Computer Science.
[9] Christos H. Papadimitriou,et al. The complexity of searching a graph , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[10] Adi Shamir,et al. How to share a secret , 1979, CACM.
[11] Moti Yung,et al. Constant-Round Perfect Zero-Knowledge Computationally Convincing Protocols , 1991, Theor. Comput. Sci..
[12] Nancy A. Lynch,et al. Cryptographic protocols , 1982, STOC '82.
[13] Shang-Hua Teng,et al. Security, Verifiability, and Universality in Distributed Computing , 1990, J. Algorithms.
[14] Moti Yung,et al. Direct Minimum-Knowledge Computations , 1987, CRYPTO.
[15] Rafail Ostrovsky,et al. Reducibility and completeness in multi-party private computations , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[16] Moti Yung,et al. Perfectly secure message transmission , 1993, JACM.
[17] Russell Impagliazzo,et al. Limits on the provable consequences of one-way permutations , 1988, STOC '89.
[18] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[19] Gilles Brassard,et al. Information theoretic reductions among disclosure problems , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[20] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[21] Silvio Micali,et al. How to simultaneously exchange a secret bit by flipping a symmetrically-biased coin , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[22] Josh Benaloh,et al. Receipt-free secret-ballot elections (extended abstract) , 1994, STOC '94.
[23] Russell Impagliazzo,et al. One-way functions are essential for complexity based cryptography , 1989, 30th Annual Symposium on Foundations of Computer Science.
[24] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[25] Hugo Krawczyk. Distributed fingerprints and secure information dispersal , 1993, PODC '93.
[26] Richard Cleve,et al. Limits on the security of coin flips when half the processors are faulty , 1986, STOC '86.
[27] Rafail Ostrovsky,et al. Fair Games against an All-Powerful Adversary , 1990, Advances In Computational Complexity Theory.
[28] Moti Yung,et al. Distributing the power of a government to enhance the privacy of voters , 1986, PODC '86.
[29] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[30] Judit Bar-Ilan,et al. Non-cryptographic fault-tolerant computing in constant number of rounds of interaction , 1989, PODC '89.
[31] Leonid A. Levin,et al. Fair Computation of General Functions in Presence of Immoral Majority , 1990, CRYPTO.
[32] Elwyn R. Berlekamp,et al. Algebraic coding theory , 1984, McGraw-Hill series in systems science.
[33] Donald Beaver,et al. Multiparty computation with faulty majority , 1989, 30th Annual Symposium on Foundations of Computer Science.
[34] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[35] László Babai,et al. Arthur-Merlin Games: A Randomized Proof System, and a Hierarchy of Complexity Classes , 1988, J. Comput. Syst. Sci..
[36] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[37] Imre Bárány,et al. Mental Poker with Three or More Players , 1983, Inf. Control..
[38] Jeffrey O. Kephart,et al. Directed-graph epidemiological models of computer viruses , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[39] Martin Tompa,et al. Random self-reducibility and zero knowledge interactive proofs of possession of information , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[40] Josh Benaloh,et al. Receipt-Free Secret-Ballot Elections , 1994, STOC 1994.
[41] Manuel Blum,et al. Coin flipping by telephone a protocol for solving impossible problems , 1983, SIGA.
[42] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[43] Matthew Franklin,et al. Complexity and security of distributed protocols , 1994 .
[44] Silvio Micali,et al. Optimal algorithms for Byzantine agreement , 1988, STOC '88.
[45] Alon Orlitsky,et al. Communication with secrecy constraints , 1984, STOC '84.
[46] Silvio Micali,et al. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[47] Andrea S. LaPaugh,et al. Recontamination does not help to search a graph , 1993, JACM.
[48] Donald Beaver,et al. Multiparty Protocols Tolerating Half Faulty Processors , 1989, CRYPTO.
[49] Ran Canetti,et al. Asynchronous secure computation , 1993, STOC.
[50] David Chaum,et al. Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result , 1987, CRYPTO.
[51] Joe Kilian,et al. Achieving oblivious transfer using weakened security assumptions , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[52] Manuel Blum,et al. Reducibility Among Protocols , 1983, CRYPTO.
[53] Moni Naor,et al. Bit Commitment Using Pseudo-Randomness , 1989, CRYPTO.
[54] Don Coppersmith,et al. Cheating at Mental Poker , 1985, CRYPTO.
[55] Moti Yung,et al. How to share a function securely , 1994, STOC '94.
[56] Donald Beaver. Perfect Privacy For Two-Party Protocols , 1989, Distributed Computing And Cryptography.
[57] Moni Naor,et al. A minimal model for secure computation (extended abstract) , 1994, STOC '94.
[58] Moti Yung,et al. Systematic Design of Two-Party Authentication Protocols , 1991, CRYPTO.
[59] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[60] Michael O. Rabin,et al. Transaction Protection by Beacons , 1983, J. Comput. Syst. Sci..
[61] Donald Beaver,et al. Foundations of Secure Interactive Computing , 1991, CRYPTO.
[62] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[63] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[64] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[65] Matthew K. Franklin,et al. Secure and Efficient Off-Line Digital Money (Extended Abstract) , 1993, ICALP.
[66] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[67] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[68] Ran Canetti,et al. Maintaining Security in the Presence of Transient Faults , 1994, CRYPTO.
[69] Reuven Bar-Yehuda,et al. Privacy, additional information, and communication , 1990, Proceedings Fifth Annual Structure in Complexity Theory Conference.
[70] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[71] Claude Crépeau,et al. Equivalence Between Two Flavours of Oblivious Transfers , 1987, CRYPTO.
[72] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[73] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[74] Claude Crépeau,et al. A Secure Poker Protocol that Minimizes the Effect of Player Coalitions , 1986, CRYPTO.
[75] Steven M. Bellovin,et al. Limitations of the Kerberos authentication system , 1990, CCRV.
[76] Joe Kilian,et al. Uses of randomness in algorithms and protocols , 1990 .
[77] Martín Abadi,et al. On Hiding Information from an Oracle , 1987, Proceeding Structure in Complexity Theory.
[78] Christos H. Papadimitriou,et al. Searching and Pebbling , 1986, Theor. Comput. Sci..
[79] Vijay V. Vazirani,et al. Trapdoor pseudo-random number generators, with applications to protocol design , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[80] Eyal Kushilevitz,et al. Private computations over the integers , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.
[81] Matthew K. Franklin,et al. Communication complexity of secure computation (extended abstract) , 1992, STOC '92.
[82] Moti Yung,et al. Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model , 1987, CRYPTO.
[83] Oded Goldreich,et al. How to Solve any Protocol Problem - An Efficiency Improvement , 1987, CRYPTO.
[84] Manuel Blum,et al. How to exchange (secret) keys , 1983, TOCS.
[85] Andrew Chi-Chih Yao,et al. Some complexity questions related to distributive computing(Preliminary Report) , 1979, STOC.
[86] Richard Cleve,et al. Controlled Gradual Disclosure Schemes for Random Bits and Their Applications , 1989, CRYPTO.
[87] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..
[88] Moti Yung,et al. Privacy from partial broadcast , 1994 .
[89] Joe Kilian,et al. A general completeness theorem for two party games , 1991, STOC '91.
[90] Joan Feigenbaum,et al. Hiding Instances in Multioracle Queries , 1990, STACS.
[91] Stuart Alan Haber. Multiparty cryptographic computation: techniques and applications , 1988 .
[92] Eyal Kushilevitz,et al. A zero-one law for Boolean privacy , 1989, STOC '89.
[93] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[94] Juan A. Garay,et al. Reaching (and Maintaining) Agreement in the Presence of Mobile Faults (Extended Abstract) , 1994, WDAG.
[95] David Chaum,et al. The Spymasters Double-Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities , 1989, CRYPTO.
[96] Michael J. Fischer,et al. A robust and verifiable cryptographically secure election scheme , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[97] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[98] Silvio Micali,et al. A Fair Protocol for Signing Contracts (Extended Abstract) , 1985, ICALP.
[99] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[100] Joan Feigenbaum,et al. Security with Low Communication Overhead , 1990, CRYPTO.
[101] Leonid A. Levin,et al. Pseudo-random generation from one-way functions , 1989, STOC '89.
[102] Michael Merritt,et al. Poker Protocols , 1985, CRYPTO.
[103] Danny Dolev,et al. On the Security of Public Key Protocols (Extended Abstract) , 1981, FOCS.
[104] Martín Abadi,et al. Authentication: A Practical Study in Belief and Action , 1988, TARK.
[105] Eyal Kushilevitz,et al. Privacy and communication complexity , 1989, 30th Annual Symposium on Foundations of Computer Science.
[106] T. D. Parsons,et al. Pursuit-evasion in a graph , 1978 .
[107] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[108] Richard Berger,et al. A Provably Secure Oblivious Transfer Protocol , 1985, EUROCRYPT.
[109] Silvio Micali,et al. The round complexity of secure protocols , 1990, STOC '90.
[110] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[111] Johan Håstad,et al. Pseudo-random generators under uniform assumptions , 1990, STOC '90.
[112] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[113] Tatsuaki Okamoto,et al. Universal Electronic Cash , 1991, CRYPTO.
[114] Tal Rabin,et al. Robust sharing of secrets when the dealer is honest or cheating , 1994, JACM.
[115] Mordechai M. Yung,et al. Cryptoprotocols: Subscription to a public key, the secret blocking and the multi-player mental poker game , 1985, CRYPTO 1985.
[116] Moti Yung,et al. The KryptoKnight family of light-weight protocols for authentication and key distribution , 1995, TNET.
[117] John Rompel,et al. One-way functions are necessary and sufficient for secure signatures , 1990, STOC '90.
[118] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[119] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[120] Michael Ben-Or,et al. Computing algebraic formulas with a constant number of registers , 1988, STOC '88.
[121] Paul D. Seymour,et al. Monotonicity in Graph Searching , 1991, J. Algorithms.
[122] Christos H. Papadimitriou,et al. Interval graphs and seatching , 1985, Discret. Math..
[123] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[124] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[125] Richard J. Lipton,et al. Foundations of Secure Computation , 1978 .
[126] Adi Shamir,et al. The cryptographic security of truncated linearly related variables , 1985, STOC '85.