Realistic Failures in Secure Multi-party Computation
暂无分享,去创建一个
[1] Birgit Pfitzmann,et al. A Universally Composable Cryptographic Library , 2003, IACR Cryptol. ePrint Arch..
[2] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[3] Silvio Micali,et al. Secure Computation (Abstract) , 1991, CRYPTO.
[4] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[5] Michel Raynal. Consensus in synchronous systems: a concise guided tour , 2002, 2002 Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings..
[6] Ueli Maurer,et al. Efficient Secure Multi-party Computation , 2000, ASIACRYPT.
[7] Birgit Pfitzmann,et al. A model for asynchronous reactive systems and its application to secure message transmission , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[8] Tatsuaki Okamoto,et al. Advances in Cryptology — ASIACRYPT 2000 , 2000, Lecture Notes in Computer Science.
[9] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[10] Silvio Micali,et al. Parallel Reducibility for Information-Theoretically Secure Computation , 2000, CRYPTO.
[11] Matthias Fitzi,et al. From partial consistency to global broadcast , 2000, STOC '00.
[12] Moti Yung,et al. Perfectly secure message transmission , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.
[13] Mihir Bellare. Advances in Cryptology — CRYPTO 2000 , 2000, Lecture Notes in Computer Science.
[14] Piotr Berman,et al. Towards optimal distributed consensus , 1989, 30th Annual Symposium on Foundations of Computer Science.
[15] Donald Beaver,et al. Foundations of Secure Interactive Computing , 1991, CRYPTO.
[16] Donald Beaver,et al. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority , 2004, Journal of Cryptology.
[17] Matthias Fitzi,et al. Efficient Byzantine Agreement Secure Against General Adversaries , 1998, DISC.
[18] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[19] Vassos Hadzilacos,et al. Issues of fault tolerance in concurrent computations (databases, reliability, transactions, agreement protocols, distributed computing) , 1985 .
[20] Joan Feigenbaum,et al. Advances in Cryptology-Crypto 91 , 1992 .
[21] Sam Toueg,et al. Distributed agreement in the presence of processor and communication faults , 1986, IEEE Transactions on Software Engineering.
[22] Yehuda Lindell,et al. On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation , 2006, CRYPTO.
[23] Danny Dolev,et al. Polynomial algorithms for multiple processor agreement , 1982, STOC '82.
[24] Matthias Fitzi,et al. Trading Correctness for Privacy in Unconditional Multi-Party Computation ? Corrected Version ?? , 1998 .
[25] Yehuda Lindell,et al. Secure Computation without Agreement , 2002, DISC.
[26] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[27] Dhiraj K. Pradhan,et al. Consensus With Dual Failure Modes , 1991, IEEE Trans. Parallel Distributed Syst..
[28] Matthias Fitzi,et al. Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract) , 1998, CRYPTO.
[29] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[30] Cynthia Dwork,et al. Advances in Cryptology – CRYPTO 2020: 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III , 2020, Annual International Cryptology Conference.
[31] Nancy A. Lynch,et al. Distributed Algorithms , 1992, Lecture Notes in Computer Science.
[32] Chiu-Yuen Koo,et al. Secure Computation with Partial Message Loss , 2006, TCC.
[33] Juan A. Garay,et al. A Continuum of Failure Models for Distributed Computing , 1992, WDAG.
[34] Michel Raynal,et al. Uniform agreement despite process omission failures , 2003, Proceedings International Parallel and Distributed Processing Symposium.
[35] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[36] Hugo Krawczyk,et al. Advances in Cryptology - CRYPTO '98 , 1998 .
[37] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.