New Constructions for UC Secure Computation Using Tamper-Proof Hardware
暂无分享,去创建一个
[1] Amit Sahai,et al. Concurrent Non-Malleable Zero Knowledge , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[2] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[3] Moni Naor,et al. Concurrent zero-knowledge , 1998, STOC '98.
[4] Ran Canetti,et al. Universally Composable Security with Global Setup , 2007, TCC.
[5] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[6] Ivan Damgård,et al. Universally Composable Multiparty Computation with Partially Isolated Parties , 2009, TCC.
[7] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[8] Jonathan Katz,et al. Universally Composable Multi-party Computation Using Tamper-Proof Hardware , 2007, EUROCRYPT.
[9] Leonid A. Levin,et al. A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..
[10] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[11] Ran Canetti,et al. Universally composable protocols with relaxed set-up assumptions , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[12] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[13] Yehuda Lindell,et al. Universally composable two-party and multi-party secure computation , 2002, STOC '02.
[14] Jörn Müller-Quade,et al. Universally composable zero-knowledge arguments and commitments from signature cards , 2007 .
[15] Amit Sahai,et al. Concurrent zero knowledge with logarithmic round-complexity , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[16] Ran Canetti,et al. Universally Composable Commitments , 2001, CRYPTO.
[17] Leonid A. Levin,et al. A hard-core predicate for all one-way functions , 1989, STOC '89.
[18] Yehuda Lindell,et al. On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions , 2003, Journal of Cryptology.
[19] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[20] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[21] Yehuda Lindell,et al. On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions , 2003, EUROCRYPT.
[22] Ran Canetti,et al. Resettable zero-knowledge (extended abstract) , 2000, STOC '00.