The Price of Low Communication in Secure Multi-party Computation
暂无分享,去创建一个
Rafail Ostrovsky | Yuval Ishai | Juan A. Garay | Vassilis Zikas | J. Garay | Vassilis Zikas | R. Ostrovsky | Y. Ishai
[1] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[2] Shafi Goldwasser,et al. Communication Locality in Secure Multi-party Computation - How to Run Sublinear Algorithms in a Distributed Setting , 2013, TCC.
[3] Oded Goldreich,et al. The Foundations of Cryptography - Volume 1: Basic Techniques , 2001 .
[4] Yuval Ishai,et al. OT-Combiners via Secure Computation , 2008, TCC.
[5] Ueli Maurer,et al. Player Simulation and General Adversary Structures in Perfect Multiparty Computation , 2000, Journal of Cryptology.
[6] Ueli Maurer,et al. Robustness for Free in Unconditional Multi-party Computation , 2001, CRYPTO.
[7] Gabriel Bracha,et al. An O(log n) expected rounds randomized byzantine generals protocol , 1987, JACM.
[8] Yuval Ishai,et al. Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator , 2005, CRYPTO.
[9] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[10] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[11] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[12] Ivan Damgård,et al. Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption , 2003, CRYPTO.
[13] Moni Naor,et al. Adaptively secure multi-party computation , 1996, STOC '96.
[14] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[15] Ran Canetti,et al. Universally Composable Commitments , 2001, CRYPTO.
[16] Rafail Ostrovsky,et al. The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults , 2015, ITCS.
[17] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[18] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[19] Martin Hirt,et al. Perfectly-Secure MPC with Linear Communication Complexity , 2008, TCC.
[20] Jared Saia,et al. Quorums Quicken Queries: Efficient Asynchronous Secure Multiparty Computation , 2013, ICDCN.
[21] Kai-Min Chung,et al. Large-Scale Secure Computation: Multi-party Computation for (Parallel) RAM Programs , 2015, CRYPTO.
[22] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[23] Donald Beaver,et al. Precomputing Oblivious Transfer , 1995, CRYPTO.
[24] Martin Hirt,et al. Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation , 2005, ASIACRYPT.
[25] Yuval Ishai,et al. Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation , 2005, TCC.
[26] Rafail Ostrovsky,et al. Secure Multi-Party Computation with Identifiable Abort , 2014, CRYPTO.
[27] Yuval Ishai,et al. Founding Cryptography on Oblivious Transfer - Efficiently , 2008, CRYPTO.
[28] Ivan Damgård,et al. Multiparty Computation from Threshold Homomorphic Encryption , 2000, EUROCRYPT.
[29] Rafail Ostrovsky,et al. Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority , 2012, CRYPTO.
[30] Ueli Maurer,et al. Efficient Secure Multi-party Computation , 2000, ASIACRYPT.
[31] Jared Saia,et al. Brief announcement: breaking the O(nm) bit barrier, secure multiparty computation with a static adversary , 2012, PODC '12.
[32] Aravind Srinivasan,et al. Randomized Distributed Edge Coloring via an Extension of the Chernoff-Hoeffding Bounds , 1997, SIAM J. Comput..
[33] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[34] Matthew K. Franklin,et al. Communication complexity of secure computation (extended abstract) , 1992, STOC '92.
[35] Markus Jakobsson,et al. Mix and Match: Secure Function Evaluation via Ciphertexts , 2000, ASIACRYPT.
[36] R. Cramer,et al. Multiparty Computation from Threshold Homomorphic Encryption , 2000 .
[37] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[38] Matthew K. Franklin,et al. Joint Encryption and Message-Efficient Secure Computation , 1993, CRYPTO.
[39] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[40] Adi Shamir,et al. How to share a secret , 1979, CACM.
[41] Yuval Ishai,et al. Circuits resilient to additive attacks with applications to secure computation , 2014, STOC.
[42] Moni Naor,et al. On Robust Combiners for Oblivious Transfer and Other Primitives , 2005, EUROCRYPT.
[43] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[44] Yuval Ishai,et al. Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography , 2010, IACR Cryptol. ePrint Arch..
[45] Yuval Ishai,et al. Scalable Secure Multiparty Computation , 2006, CRYPTO.
[46] Jürg Wullschleger,et al. Robuster Combiners for Oblivious Transfer , 2007, TCC.
[47] Martin Hirt,et al. Efficient Multi-party Computation with Dispute Control , 2006, TCC.
[48] Ivan Damgård,et al. Scalable and Unconditionally Secure Multiparty Computation , 2007, CRYPTO.
[49] Silvio Micali,et al. A Completeness Theorem for Protocols with Honest Majority , 1987, STOC 1987.
[50] W. Hoeffding. Probability Inequalities for sums of Bounded Random Variables , 1963 .
[51] Peter Bro Miltersen,et al. Efficient Multiparty Protocols via Log-Depth Threshold Formulae , 2013, Electron. Colloquium Comput. Complex..
[52] Avi Wigderson,et al. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract) , 1988, STOC.
[53] Martin Hirt,et al. Adaptively Secure Broadcast , 2010, EUROCRYPT.
[54] Rudolf Ahlswede,et al. Founding Cryptography on Oblivious Transfer , 2016 .
[55] Ueli Maurer,et al. Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract) , 1997, PODC '97.
[56] Ivan Damgård,et al. Improved Non-committing Encryption Schemes Based on a General Complexity Assumption , 2000, Annual International Cryptology Conference.
[57] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.