Bounded-concurrent secure two-party computation without setup assumptions
暂无分享,去创建一个
[1] Adi Shamir,et al. Multiple NonInteractive Zero Knowledge Proofs Under General Assumptions , 1999, SIAM J. Comput..
[2] Rafael Pass,et al. Bounded-concurrent secure multi-party computation with a dishonest majority , 2004, STOC '04.
[3] Boaz Barak,et al. Constant-round coin-tossing with a man in the middle or realizing the shared random string model , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[4] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[5] Yehuda Lindell,et al. General Composition and Universal Composability in Secure Multiparty Computation , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..
[6] Alon Rosen,et al. A Note on the Round-Complexity of Concurrent Zero-Knowledge , 2000, CRYPTO.
[7] Yehuda Lindell,et al. Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation , 2001, Journal of Cryptology.
[8] Yehuda Lindell. Composition of Secure Multi-Party Protocols: A Comprehensive Study , 2003 .
[9] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[10] Ran Canetti,et al. Black-box concurrent zero-knowledge requires \tilde {Ω} (logn) rounds , 2001, STOC '01.
[11] Oded Goldreich,et al. How to construct constant-round zero-knowledge proof systems for NP , 1996, Journal of Cryptology.
[12] Rafael Pass,et al. Bounded-concurrent secure two-party computation in a constant number of rounds , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..
[13] Juan A. Garay,et al. Concurrent oblivious transfer , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[14] Joe Kilian,et al. On the Concurrent Composition of Zero-Knowledge Proofs , 1999, EUROCRYPT.
[15] Russell Impagliazzo,et al. One-way functions are essential for complexity based cryptography , 1989, 30th Annual Symposium on Foundations of Computer Science.
[16] Yehuda Lindell,et al. On the composition of authenticated byzantine agreement , 2002, STOC '02.
[17] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[18] Ran Canetti,et al. Universally Composable Commitments , 2001, CRYPTO.
[19] Birgit Pfitzmann,et al. Composition and integrity preservation of secure reactive systems , 2000, CCS.
[20] Oded Goldreich,et al. Universal arguments and their applications , 2002, Proceedings 17th IEEE Annual Conference on Computational Complexity.
[21] Yehuda Lindell,et al. Universally composable two-party and multi-party secure computation , 2002, STOC '02.
[22] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[23] Donald Beaver,et al. Foundations of Secure Interactive Computing , 1991, CRYPTO.
[24] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[25] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[26] Oded Goldreich,et al. Foundations of Cryptography: Volume 1, Basic Tools , 2001 .
[27] John Rompel,et al. One-way functions are necessary and sufficient for secure signatures , 1990, STOC '90.
[28] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[29] Moni Naor,et al. Concurrent zero-knowledge , 2004, JACM.
[30] Yehuda Lindell,et al. On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions , 2003, EUROCRYPT.
[31] Adi Shamir,et al. Witness indistinguishable and witness hiding protocols , 1990, STOC '90.
[32] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[33] Joe Kilian,et al. Lower bounds for zero knowledge on the Internet , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[34] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[35] Moni Naor,et al. Non-malleable cryptography , 1991, STOC '91.
[36] Silvio Micali,et al. Secure Computation (Abstract) , 1991, CRYPTO.
[37] J. Kilian,et al. Concurrent and Resettable Zero-Knowledge in Poly-logarithmic Rounds [ Extended Abstract ] , 2001 .
[38] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[39] Yehuda Lindell,et al. Strict polynomial-time in simulation and extraction , 2002, STOC '02.
[40] Leonid A. Levin,et al. Fair Computation of General Functions in Presence of Immoral Majority , 1990, CRYPTO.
[41] Yehuda Lindell,et al. Lower Bounds for Concurrent Self Composition , 2004, TCC.
[42] Joe Kilian,et al. Concurrent and resettable zero-knowledge in poly-loalgorithm rounds , 2001, STOC '01.
[43] Boaz Barak,et al. How to go beyond the black-box simulation barrier , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[44] Amit Sahai,et al. Concurrent zero knowledge with logarithmic round-complexity , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..