General Secure Multi-party Computation from any Linear Secret-Sharing Scheme
暂无分享,去创建一个
[1] Ivan Damgård,et al. Efficient Multiparty Computations Secure Against an Adaptive Adversary , 1999, EUROCRYPT.
[2] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .
[3] Anna Gál. A characterization of span program size and improved lower bounds for monotone span programs , 1998, STOC '98.
[4] Matthias Fitzi,et al. Efficient Byzantine Agreement Secure Against General Adversaries , 1998, DISC.
[5] Ernest F. Brickell,et al. Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.
[6] Rosario Gennaro,et al. Theory and practice of verifiable secret sharing , 1996 .
[7] Anna Gál,et al. Combinatorial methods in boolean function complexity , 1995 .
[8] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[9] Ueli Maurer,et al. Player Simulation and General Adversary Structures in Perfect Multiparty Computation , 2000, Journal of Cryptology.
[10] Ivan Damgård,et al. Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free? , 1998, CRYPTO.
[11] Jeroen van de Graaf,et al. Committed Oblivious Transfer and Private Multi-Party Computation , 1995, CRYPTO.
[12] Donald Beaver,et al. Foundations of Secure Interactive Computing , 1991, CRYPTO.
[13] Avi Wigderson,et al. On span programs , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.
[14] Ingemar Ingemarsson,et al. A Construction of Practical Secret Sharing Schemes using Linear Block Codes , 1992, AUSCRYPT.
[15] van Me Marten Dijk. Secret key sharing and secret key generation , 1997 .
[16] Silvio Micali,et al. Secure Computation (Abstract) , 1991, CRYPTO.
[17] Josh Benaloh,et al. Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.
[18] Moni Naor,et al. Adaptively secure multi-party computation , 1996, STOC '96.
[19] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[20] Adi Shamir,et al. How to share a secret , 1979, CACM.
[21] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[22] Moti Yung,et al. Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model , 1987, CRYPTO.
[23] Jirí Sgall,et al. Algebraic models of computation and interpolation for algebraic proof systems , 1996, Proof Complexity and Feasible Arithmetics.
[24] Donald Beaver,et al. Quorum-Based Secure Multi-party Computation , 1998, EUROCRYPT.
[25] Ivan Damgård,et al. On the complexity of verifiable secret sharing and multiparty computation , 2000, STOC '00.
[26] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[27] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[28] Tal Rabin,et al. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography , 1998, PODC '98.
[29] Tal Rabin,et al. Robust sharing of secrets when the dealer is honest or cheating , 1994, JACM.