Graph Coloring Applied to Secure Computation in Non-Abelian Groups
暂无分享,去创建一个
Ron Steinfeld | Yvo Desmedt | Andrew Chi-Chih Yao | Huaxiong Wang | Christophe Tartary | Josef Pieprzyk | Xiaoming Sun
[1] J. Hammersley. Percolation Processes: Lower Bounds for the Critical Probability , 1957 .
[2] Yuval Ishai,et al. Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography , 2010, IACR Cryptol. ePrint Arch..
[3] Adi Shamir,et al. How to share a secret , 1979, CACM.
[4] Ivan Damgård,et al. Scalable and Unconditionally Secure Multiparty Computation , 2007, CRYPTO.
[5] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[6] Noga Alon,et al. The Probabilistic Method , 2015, Fundamentals of Ramsey Theory.
[7] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[8] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[10] Noga Alon,et al. The Probabilistic Method, Second Edition , 2004 .
[11] Choonsik Park,et al. New Public Key Cryptosystem Using Finite Non Abelian Groups , 2001, CRYPTO.
[12] Ron Steinfeld,et al. On Secure Multi-party Computation in Black-Box Groups , 2007, CRYPTO.
[13] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[14] Yongge Wang,et al. A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback , 2005, ISAAC.
[15] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[16] Wendelin Werner,et al. CRITICAL EXPONENTS FOR TWO-DIMENSIONAL PERCOLATION , 2001 .
[17] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[18] Reinhard Diestel,et al. Graph Theory , 1997 .
[19] David A. Mix Barrington,et al. Bounded-width polynomial-size branching programs recognize exactly those languages in NC1 , 1986, STOC '86.
[20] Neal R. Wagner,et al. A Public Key Cryptosystem Based on the Word Problem , 1985, CRYPTO.
[21] H. Kesten. Percolation theory for mathematicians , 1982 .
[22] H. Poincaré,et al. Percolation ? , 1982 .
[23] Judit Bar-Ilan,et al. Non-cryptographic fault-tolerant computing in constant number of rounds of interaction , 1989, PODC '89.
[24] Eike Kiltz,et al. Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation , 2006, IACR Cryptol. ePrint Arch..
[25] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[26] Ueli Maurer,et al. Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract) , 1997, PODC '97.
[27] Yuval Ishai,et al. Efficient Multi-party Computation over Rings , 2003, EUROCRYPT.
[28] A. Myasnikov,et al. Group-based Cryptography , 2008 .
[29] Andrew Chi-Chih Yao,et al. Graph Design for Secure Multiparty Computation over Non-Abelian Groups , 2008, ASIACRYPT.
[30] Douglas R. Stinson,et al. New Approaches to Designing Public Key Cryptosystems Using One-Way Functions and Trapdoors in Finite Groups , 2001, Journal of Cryptology.
[31] Yvo Desmedt,et al. Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract) , 1992, CRYPTO.