Correlated pseudorandomness and the complexity of private computations
暂无分享,去创建一个
[1] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[2] Donald Beaver,et al. Global, Unpredictable Bit Generation Without Broadcast , 1994, EUROCRYPT.
[3] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[4] Leonid A. Levin,et al. Pseudo-random generation from one-way functions , 1989, STOC '89.
[5] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[6] Donald Beaver,et al. Multiparty Computation with Faulty Majority , 1989, CRYPTO.
[7] Eyal Kushilevitz,et al. Privacy and communication complexity , 1989, 30th Annual Symposium on Foundations of Computer Science.
[8] Eyal Kushilevitz,et al. A Zero-One Law for Boolean Privacy , 1991, SIAM J. Discret. Math..
[9] Moti Yung,et al. Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model , 1987, CRYPTO.
[10] Oded Goldreich,et al. How to Solve any Protocol Problem - An Efficiency Improvement , 1987, CRYPTO.
[11] Leonid A. Levin,et al. Fair Computation of General Functions in Presence of Immoral Majority , 1990, CRYPTO.
[12] Michael Ben-Or,et al. Another advantage of free choice (Extended Abstract): Completely asynchronous agreement protocols , 1983, PODC '83.
[13] Eyal Kushilevitz,et al. A zero-one law for Boolean privacy , 1989, STOC '89.
[14] Silvio Micali,et al. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[15] Gilles Brassard,et al. All-or-Nothing Disclosure of Secrets , 1986, CRYPTO.
[16] Gilles Brassard,et al. Information theoretic reductions among disclosure problems , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[17] Claude Cripeaut. Equivalence Between Two Flavours of Oblivious Transfers , 1988 .
[18] Donald Beaver,et al. Precomputing Oblivious Transfer , 1995, CRYPTO.
[19] Gilles Brassard,et al. Zero-Knowledge Simulation of Boolean Circuits , 1986, CRYPTO.
[20] Silvio Micali,et al. Non-Interactive Oblivious Transfer and Applications , 1989, CRYPTO.
[21] Michael Ben-Or,et al. Another advantage of free choice (Extended Abstract): Completely asynchronous agreement protocols , 1983, PODC '83.
[22] Joe Kilian,et al. A general completeness theorem for two party games , 1991, STOC '91.
[23] Reuven Bar-Yehuda,et al. Privacy, additional information and communication , 1993, IEEE Trans. Inf. Theory.
[24] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[25] Rafail Ostrovsky,et al. Fair Games against an All-Powerful Adversary , 1990, Advances In Computational Complexity Theory.
[26] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[27] Russell Impagliazzo,et al. Limits on the Provable Consequences of One-way Permutations , 1988, CRYPTO.
[28] Rafail Ostrovsky,et al. Minimum resource zero knowledge proofs , 1989, 30th Annual Symposium on Foundations of Computer Science.
[29] Bert den Boer. Oblivous Transfer Protecting Secrecy , 1991, EUROCRYPT.
[30] Rafail Ostrovsky,et al. Reducibility and completeness in multi-party private computations , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[31] Donald Beaver. Perfect Privacy For Two-Party Protocols , 1989, Distributed Computing And Cryptography.
[32] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.