Universally Composable Almost-Everywhere Secure Computation
暂无分享,去创建一个
Rafail Ostrovsky | Juan A. Garay | Vassilis Zikas | Nishanth Chandran | Pouyan Forghani | Rutvik Patel | J. Garay | Vassilis Zikas | R. Ostrovsky | Nishanth Chandran | Rutvik Patel | Pouyan Forghani
[1] Kaoru Kurosawa,et al. Truly Efficient $2$-Round Perfectly Secure Message Transmission Scheme , 2009, IEEE Transactions on Information Theory.
[2] Danny Dolev,et al. Unanimity in an unknown and unreliable environment , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[3] Matthias Fitzi,et al. Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract) , 1998, CRYPTO.
[4] Ueli Maurer,et al. Bitcoin as a Transaction Ledger: A Composable Treatment , 2017, CRYPTO.
[5] Alexander Lubotzky,et al. Explicit expanders and the Ramanujan conjectures , 1986, STOC '86.
[6] Ran Cohen,et al. Breaking the O(√ n)-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party , 2021, PODC.
[7] Rafail Ostrovsky,et al. Almost-Everywhere Secure Computation , 2008, EUROCRYPT.
[8] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[9] Rafail Ostrovsky,et al. Improved Fault Tolerance and Secure Computation on Sparse Networks , 2010, ICALP.
[10] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[11] Jesper Buus Nielsen,et al. On Protocol Security in the Cryptographic Model , 2003 .
[12] Juan A. Garay,et al. A Continuum of Failure Models for Distributed Computing , 1992, WDAG.
[13] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Abstract) , 1987, CRYPTO.
[14] Yehuda Lindell,et al. Secure Computation Without Authentication , 2005, Journal of Cryptology.
[15] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[16] Ueli Maurer,et al. Universally Composable Synchronous Computation , 2013, TCC.
[17] Moti Yung,et al. Perfectly secure message transmission , 1993, JACM.
[18] Avi Wigderson,et al. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract) , 1988, STOC.
[19] Ueli Maurer,et al. Abstract Cryptography , 2011, ICS.
[20] Silvio Micali,et al. How to play any mental game, or a completeness theorem for protocols with honest majority , 2019, Providing Sound Foundations for Cryptography.
[21] Ueli Maurer,et al. Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract) , 1997, PODC '97.
[22] Andrew Chi-Chih Yao,et al. Space-time tradeoff for answering range queries (Extended Abstract) , 1982, STOC '82.
[23] Ran Canetti,et al. Universal Composition with Global Subroutines: Capturing Global Setup within plain UC , 2020, IACR Cryptol. ePrint Arch..
[24] Birgit Pfitzmann,et al. A composable cryptographic library with nested operations , 2003, CCS '03.
[25] Matthias Fitzi,et al. MPC vs. SFE: Perfect Security in a Unified Corruption Model , 2008, TCC.
[26] Ran Canetti,et al. Universally Composable Security with Global Setup , 2007, TCC.
[27] Dennis Hofheinz,et al. GNUC: A New Universal Composability Framework , 2015, Journal of Cryptology.
[28] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[29] Jared Saia,et al. From Almost Everywhere to Everywhere: Byzantine Agreement with Õ(n3/2) Bits , 2009, DISC.
[30] Martin Hirt,et al. Adaptively Secure Broadcast , 2010, EUROCRYPT.
[31] Matthias Fitzi,et al. Efficient player-optimal protocols for strong and differential consensus , 2003, PODC '03.
[32] Ralf Küsters,et al. iUC: Flexible Universal Composability Made Simple , 2019, IACR Cryptol. ePrint Arch..
[33] Eli Upfal. Tolerating linear number of faults in networks of bounded degree , 1992, PODC '92.
[34] Eli Upfal,et al. Fault Tolerance in Networks of Bounded Degree (Preliminary Version) , 1986, STOC 1986.