Interactive Hashing: An Information Theoretic Tool (Invited Talk)
暂无分享,去创建一个
[1] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[2] Jonathan Katz,et al. Reducing Complexity Assumptions for Statistically-Hiding Commitment , 2005, EUROCRYPT.
[3] Yan Zong Ding,et al. Oblivious Transfer in the Bounded Storage Model , 2001, CRYPTO.
[4] Salil P. Vadhan,et al. Zero knowledge with efficient provers , 2006, STOC '06.
[5] Omer Reingold,et al. A New Interactive Hashing Theorem , 2007, Computational Complexity Conference.
[6] Rafail Ostrovsky,et al. Fair Games against an All-Powerful Adversary , 1990, Advances In Computational Complexity Theory.
[7] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[8] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[9] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[10] Claude Crépeau,et al. Optimal Reductions Between Oblivious Transfers Using Interactive Hashing , 2006, EUROCRYPT.
[11] Jonathan Katz,et al. Reducing Complexity Assumptions for Statistically-Hiding Commitment , 2009, Journal of Cryptology.
[12] Gilles Brassard,et al. Information theoretic reductions among disclosure problems , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[13] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[14] Serge Vaudenay,et al. Advances in Cryptology - EUROCRYPT 2006 , 2006, Lecture Notes in Computer Science.
[15] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[16] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[17] Ronen Shaltiel,et al. Constant-Round Oblivious Transfer in the Bounded Storage Model , 2004, Journal of Cryptology.
[18] Rafail Ostrovsky,et al. Secure Commitment Against A Powerful Adversary , 1992, STACS.
[19] Salil P. Vadhan,et al. Statistical Zero-Knowledge Arguments for NP from Any One-Way Function , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[20] George Savvides,et al. Interactive hashing and reductions between oblivious transfer variants , 2007 .
[21] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[22] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[23] Claude Crépeau,et al. Oblivious transfer with a memory-bounded receiver , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[24] Tor Helleseth,et al. Advances in Cryptology — EUROCRYPT ’93 , 2001, Lecture Notes in Computer Science.
[25] Rafail Ostrovsky,et al. Perfect Zero-Knowledge Arguments for NP Using Any One-Way Permutation , 1998, Journal of Cryptology.
[26] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[27] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[28] Rafail Ostrovsky,et al. Interactive Hashing Simplifies Zero-Knowledge Protocol Design , 1994, EUROCRYPT.