On the Power of Correlated Randomness in Secure Computation
暂无分享,去创建一个
Anat Paskin-Cherniavsky | Yuval Ishai | Eyal Kushilevitz | Claudio Orlandi | Sigurd Meldgaard | E. Kushilevitz | Y. Ishai | Anat Paskin-Cherniavsky | Claudio Orlandi | Sigurd Meldgaard
[1] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[2] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[3] Donald Beaver,et al. Precomputing Oblivious Transfer , 1995, CRYPTO.
[4] Ivan Damgård,et al. Semi-Homomorphic Encryption and Multiparty Computation , 2011, IACR Cryptol. ePrint Arch..
[5] Matthias Fitzi,et al. Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness , 2004, CRYPTO.
[6] Matthias Fitzi,et al. Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch , 2002, EUROCRYPT.
[7] Avi Wigderson,et al. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract) , 1988, STOC.
[8] Moni Naor,et al. Derandomized Constructions of k-Wise (Almost) Independent Permutations , 2005, Algorithmica.
[9] Ivan Damgård,et al. Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[10] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[11] Donald Beaver,et al. Commodity-based cryptography (extended abstract) , 1997, STOC '97.
[12] Yuval Ishai,et al. Priced Oblivious Transfer: How to Sell Digital Goods , 2001, EUROCRYPT.
[13] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[14] Goichiro Hanaoka,et al. Information-theoretically secure oblivious polynomial evaluation in the commodity-based model , 2014, International Journal of Information Security.
[15] Mihir Bellare,et al. Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing , 2012, ASIACRYPT.
[16] Barbara Masucci,et al. Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes , 2002, Des. Codes Cryptogr..
[17] Claudio Orlandi,et al. A New Approach to Practical Active-Secure Two-Party Computation , 2012, IACR Cryptol. ePrint Arch..
[18] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[19] Birgit Pfitzmann,et al. Information-Theoretic Pseudosignatures and Byzantine Agreement for t ≥ n/3 , 2007 .
[20] Donald Beaver,et al. Efficient Multiparty Protocols Using Circuit Randomization , 1991, CRYPTO.
[21] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[22] Ivan Damgård,et al. Constant-Overhead Secure Computation for Boolean Circuits in the Preprocessing Model , 2012, IACR Cryptol. ePrint Arch..
[23] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[24] C. Pandu Rangan,et al. Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience , 2009, INDOCRYPT.
[25] Ivan Damgård,et al. Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing , 2013, TCC.
[26] Severin Winkler,et al. On the Efficiency of Classical and Quantum Oblivious Transfer Reductions , 2010, IACR Cryptol. ePrint Arch..
[27] Rafail Ostrovsky,et al. Identifying Cheaters without an Honest Majority , 2012, TCC.
[28] InitializerRonald L. RivestLaboratory. Unconditionally Secure Commitment and Oblivious Transfer Schemes Using Private Channels and a Trusted Initializer , 1999 .
[29] Ivan Damgård,et al. Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.
[30] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[31] Dan Bogdanov,et al. Deploying Secure Multi-Party Computation for Financial Data Analysis - (Short Paper) , 2012, Financial Cryptography.
[32] Shachar Lovett,et al. Probabilistic existence of regular combinatorial structures , 2011, ArXiv.
[33] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[34] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[35] Shachar Lovett,et al. Probabilistic existence of rigid combinatorial structures , 2012, STOC '12.
[36] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[37] Jeroen van de Graaf,et al. A Two-Party Protocol with Trusted Initializer for Computing the Inner Product , 2010, WISA.
[38] A. Yao. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[39] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[40] Yuval Ishai,et al. Founding Cryptography on Oblivious Transfer - Efficiently , 2008, CRYPTO.