Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract)
暂无分享,去创建一个
[1] Shlomi Dolev,et al. Secret Sharing Krohn-Rhodes: Private and Perennial Distributed Computation , 2011, ICS.
[2] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[3] Adi Shamir,et al. RFID Authentication Efficient Proactive Information Security within Computational Security , 2009, Theory of Computing Systems.
[4] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[5] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[6] Yuval Ishai,et al. Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation , 2005, TCC.
[7] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[8] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[9] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[10] Moti Yung,et al. Secret Swarm UnitReactive k-Secret Sharing , 2007, INDOCRYPT.
[11] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[12] Adi Shamir,et al. How to share a secret , 1979, CACM.
[13] Kevin L. Moore,et al. Flight demonstrations of unmanned aerial vehicle swarming concepts , 2006 .
[14] Moti Yung,et al. Secret swarm unit: Reactive k-secret sharing , 2012, Ad Hoc Networks.
[15] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[16] Birgit Pfitzmann,et al. Composition and integrity preservation of secure reactive systems , 2000, CCS.
[17] Paul G. Spirakis,et al. Information security for sensors by overwhelming random sequences and permutations , 2010, DIALM-POMC '10.
[18] Shlomi Dolev,et al. Swarming secrets , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[19] Shlomi Dolev,et al. Direction election in flocking swarms , 2010, DIALM-POMC '10.