On 2-Round Secure Multiparty Computation
暂无分享,去创建一个
Yuval Ishai | Eyal Kushilevitz | Tal Rabin | Rosario Gennaro | T. Rabin | E. Kushilevitz | R. Gennaro | Y. Ishai
[1] Joe Kilian,et al. One-Round Secure Computation and Secure Autonomous Mobile Agents , 2000, ICALP.
[2] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[3] Judit Bar-Ilan,et al. Non-cryptographic fault-tolerant computing in constant number of rounds of interaction , 1989, PODC '89.
[4] Silvio Micali,et al. An Optimal Algorithm for Synchronous Byzantine Agreement , 1997 .
[5] Yuval Ishai,et al. Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials , 2002, ICALP.
[6] A. Yao. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[7] Yuval Ishai,et al. Randomizing polynomials: A new representation with applications to round-efficient secure computation , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[8] Yuval Ishai,et al. The round complexity of verifiable secret sharing and secure multicast , 2001, STOC '01.
[9] Ivan Damgård,et al. Efficient Multiparty Computations Secure Against an Adaptive Adversary , 1999, EUROCRYPT.
[10] Joan Feigenbaum,et al. Security with Low Communication Overhead , 1990, CRYPTO.
[11] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[12] Rafail Ostrovsky,et al. How To Withstand Mobile Virus Attacks , 1991, PODC 1991.
[13] Silvio Micali,et al. The Round Complexity of Secure Protocols (Extended Abstract) , 1990, STOC 1990.
[14] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[15] Silvio Micali,et al. An Optimal Probabilistic Protocol for Synchronous Byzantine Agreement , 1997, SIAM J. Comput..
[16] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[17] Rosario Gennaro. Achieving independence efficiently and securely , 1995, PODC '95.
[18] Moti Yung,et al. Non-interactive cryptocomputing for NC/sup 1/ , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[19] Moni Naor,et al. A minimal model for secure computation (extended abstract) , 1994, STOC '94.
[20] Yuval Ishai,et al. Private simultaneous messages protocols with applications , 1997, Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems.
[21] Yehuda Lindell,et al. Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation , 2001, Journal of Cryptology.
[22] Donald Beaver. Minimal-Latency Secure Function Evaluation , 2000, EUROCRYPT.
[23] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[24] Ronald Cramer,et al. Efficient Multiparty Computations with Dishonest Minority , 1998 .
[25] Rafail Ostrovsky,et al. How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.
[26] Seif Haridi,et al. Distributed Algorithms , 1992, Lecture Notes in Computer Science.
[27] Oded Goldreich,et al. Foundations of Cryptography (Fragments of a Book) , 1995 .
[28] Piotr Berman,et al. Bit optimal distributed consensus , 1992 .
[29] Silvio Micali,et al. The round complexity of secure protocols , 1990, STOC '90.
[30] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[31] Nathan Linial,et al. Collective Coin Flipping , 1989, Advances in Computational Research.
[32] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[33] Ivan Damgård,et al. Secure Distributed Linear Algebra in a Constant Number of Rounds , 2001, CRYPTO.