Secure Multiparty Computation Goes Live
暂无分享,去创建一个
Ivan Damgård | Tomas Toft | Martin Geisler | Michael I. Schwartzbach | Janus Dam Nielsen | Jakob Illeborg Pagter | Jesper Buus Nielsen | Peter Bogetoft | Thomas P. Jakobsen | Dan Lund Christensen | Kurt Nielsen | Mikkel Krøigaard | J. D. Nielsen | M. I. Schwartzbach | I. Damgård | M. Schwartzbach | J. Nielsen | P. Bogetoft | Mikkel Krøigaard | M. Geisler | K. Nielsen | J. Pagter | T. Toft | Tomas Toft
[1] A. Gibbard. Manipulation of Voting Schemes: A General Result , 1973 .
[2] R. Myerson. Incentive Compatibility and the Bargaining Problem , 1979 .
[3] E. Maskin,et al. The Implementation of Social Choice Rules: Some General Results on Incentive Compatibility , 1979 .
[4] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[5] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[6] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[7] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[8] Ueli Maurer,et al. Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract) , 1997, PODC '97.
[9] Ronald Cramer,et al. A secure and optimally efficient multi-authority election scheme , 1997, Eur. Trans. Telecommun..
[10] Tal Rabin,et al. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography , 1998, PODC '98.
[11] Ronald Cramer,et al. Efficient Multiparty Computations with Dishonest Minority , 1998 .
[12] Ivan Damgård,et al. Efficient Multiparty Computations Secure Against an Adaptive Adversary , 1999, EUROCRYPT.
[13] Ueli Maurer,et al. General Secure Multi-party Computation from any Linear Secret-Sharing Scheme , 2000, EUROCRYPT.
[14] I. Damgård,et al. A Generalisation, a Simplification and some Applications of Paillier’s Probabilistic Public-Key System , 2000 .
[15] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[16] Ivan Damgård,et al. Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption , 2003, CRYPTO.
[17] Eike Kiltz,et al. Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation , 2006, IACR Cryptol. ePrint Arch..
[18] R. Cramer,et al. Contemporary Cryptology (Advanced Courses in Mathematics - CRM Barcelona) , 2005 .
[19] R. Cramer,et al. Multiparty Computation, an Introduction , 2005 .
[20] Ivan Damgård,et al. A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation , 2006, Financial Cryptography.
[21] Ivan Damgård,et al. Non-interactive Proofs for Integer Multiplication , 2007, EUROCRYPT.
[22] P. Bogetoft,et al. Reallocating Sugar Beet Contracts: Can Sugar Production Survive in Denmark? , 2007 .
[23] Michael I. Schwartzbach,et al. A domain-specific programming language for secure multiparty computation , 2007, PLAS '07.