Collusion-Free Multiparty Computation in the Mediated Model
暂无分享,去创建一个
Abhi Shelat | Yehuda Lindell | Ivan Visconti | Giuseppe Persiano | Jonathan Katz | Joël Alwen | Jonathan Katz | Abhi Shelat | G. Persiano | Yehuda Lindell | J. Alwen | Ivan Visconti
[1] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[2] Gustavus J. Simmons,et al. Cryptanalysis and protocol failures , 1994, CACM.
[3] Yvo Desmedt,et al. Simmons' protocol is not free of subliminal channels , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[4] Gustavus J. Simmons,et al. The history of subliminal channels , 1996, IEEE J. Sel. Areas Commun..
[5] Moti Yung,et al. A Progress Report on Subliminal-Free Channels , 1996, Information Hiding.
[6] Jesse A. Schwartz,et al. Collusive Bidding: Lessons from the FCC Spectrum Auctions , 2000 .
[7] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[8] Rafael Pass,et al. Bounded-concurrent secure two-party computation in a constant number of rounds , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..
[9] Rafael Pass,et al. Bounded-concurrent secure multi-party computation with a dishonest majority , 2004, STOC '04.
[10] Abhi Shelat,et al. Fair-Zero Knowledge , 2005, TCC.
[11] Sergei Izmalkov,et al. Rational secure computation and ideal mechanism design , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[12] Abhi Shelat,et al. Collusion-free protocols , 2005, STOC '05.
[13] Yehuda Lindell. Protocols for Bounded-Concurrent Secure Two-Party Computation , 2006, Chic. J. Theor. Comput. Sci..
[14] Yehuda Lindell,et al. Lower Bounds and Impossibility Results for Concurrent Self Composition , 2008, Journal of Cryptology.
[15] Abhi Shelat,et al. Collusion-Free Protocols in the Mediated Model , 2008, CRYPTO.
[16] Sergei Izmalkov,et al. Verifiably Secure Devices , 2008, TCC.
[17] John Langford,et al. Provably Secure Steganography , 2009, IEEE Trans. Computers.
[18] Abhi Shelat. Collusion-free protocols , 2010, BQGT.
[19] Yehuda Lindell,et al. Secure Computation Without Authentication , 2005, Journal of Cryptology.
[20] Arbeitsgruppe Systemsicherheit. On Subliminal Channels in Deterministic Signature Schemes , 2022 .