MPC vs. SFE: Perfect Security in a Unified Corruption Model
暂无分享,去创建一个
[1] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[2] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[3] Matthias Fitzi,et al. Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract) , 1998, CRYPTO.
[4] Silvio Micali,et al. Parallel Reducibility for Information-Theoretically Secure Computation , 2000, CRYPTO.
[5] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[6] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[7] Danny Dolev,et al. Polynomial algorithms for multiple processor agreement , 1982, STOC '82.
[8] Silvio Micali,et al. Secure Computation (Abstract) , 1991, CRYPTO.
[9] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[10] Ueli Maurer,et al. Player Simulation and General Adversary Structures in Perfect Multiparty Computation , 2000, Journal of Cryptology.
[11] Matthias Fitzi,et al. Byzantine Agreement Secure against General Adversaries in the Dual Failure Model , 1999, DISC.
[12] Ueli Maurer,et al. Secure multi-party computation made simple , 2002, Discret. Appl. Math..
[13] Donald Beaver,et al. Foundations of Secure Interactive Computing , 1991, CRYPTO.
[14] Donald Beaver,et al. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority , 2004, Journal of Cryptology.
[15] Juan A. Garay,et al. A Continuum of Failure Models for Distributed Computing , 1992, WDAG.
[16] Birgit Pfitzmann,et al. A model for asynchronous reactive systems and its application to secure message transmission , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[17] Ueli Maurer,et al. Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract) , 1997, PODC '97.
[18] Matthias Fitzi,et al. Trading Correctness for Privacy in Unconditional Multi-Party Computation ? Corrected Version ?? , 1998 .
[19] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[20] Matthias Fitzi,et al. Efficient Byzantine Agreement Secure Against General Adversaries , 1998, DISC.
[21] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[22] Yehuda Lindell,et al. On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation , 2006, CRYPTO.
[23] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[24] Dhiraj K. Pradhan,et al. Consensus With Dual Failure Modes , 1991, IEEE Trans. Parallel Distributed Syst..
[25] Matthias Fitzi,et al. General Adversaries in Unconditional Multi-party Computation , 1999, ASIACRYPT.