Collusion-free protocols
暂无分享,去创建一个
[1] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[2] Michael Backes,et al. Public-Key Steganography with Active Attacks , 2005, TCC.
[3] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[4] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[5] Kevin Barraclough,et al. I and i , 2001, BMJ : British Medical Journal.
[6] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[7] Manuel Blum,et al. Noninteractive Zero-Knowledge , 1991, SIAM J. Comput..
[8] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[9] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[10] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[11] Silvio Micali,et al. Parallel Reducibility for Information-Theoretically Secure Computation , 2000, CRYPTO.
[12] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[13] Moni Naor,et al. Adaptively secure multi-party computation , 1996, STOC '96.
[14] Abhi Shelat,et al. Fair-Zero Knowledge , 2005, TCC.
[15] Stefan Katzenbeisser,et al. Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.