Secure Computation with Minimal Interaction, Revisited
暂无分享,去创建一个
Anat Paskin-Cherniavsky | Yuval Ishai | Eyal Kushilevitz | Ranjit Kumaresan | R. Kumaresan | E. Kushilevitz | Y. Ishai | Anat Paskin-Cherniavsky | Yuval Ishai
[1] C. Pandu Rangan,et al. The Round Complexity of Verifiable Secret Sharing Revisited , 2009, CRYPTO.
[2] Ivan Damgård,et al. Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.
[3] Yuval Ishai,et al. On the Cryptographic Complexity of the Worst Functions , 2014, TCC.
[4] Ivan Damgård,et al. Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing , 2013, TCC.
[5] Nancy A. Lynch,et al. A Lower Bound for the Time to Assure Interactive Consistency , 1982, Inf. Process. Lett..
[6] Anat Paskin-Cherniavsky,et al. On the Power of Correlated Randomness in Secure Computation , 2013, TCC.
[7] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[8] Anat Paskin-Cherniavsky,et al. Secure Multiparty Computation with Minimal Interaction , 2010, CRYPTO.
[9] Moni Naor,et al. A minimal model for secure computation (extended abstract) , 1994, STOC '94.
[10] Yuval Ishai,et al. The round complexity of verifiable secret sharing and secure multicast , 2001, STOC '01.
[11] Yehuda Lindell,et al. An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries , 2007, Journal of Cryptology.
[12] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .
[13] P. MuraliKrishna,et al. SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .
[14] Jonathan Katz,et al. Round-Efficient Secure Computation in Point-to-Point Networks , 2007, EUROCRYPT.
[15] Rafail Ostrovsky,et al. Round-Optimal Secure Two-Party Computation , 2004, CRYPTO.
[16] Shashank Agrawal. Verifiable secret sharing in a total of three rounds , 2012, Inf. Process. Lett..
[17] Rafael Pass,et al. The Curious Case of Non-Interactive Commitments - On the Power of Black-Box vs. Non-Black-Box Use of Primitives , 2012, CRYPTO.
[18] Craig Gentry,et al. Two-Round Secure MPC from Indistinguishability Obfuscation , 2014, TCC.
[19] Ivan Damgård,et al. Semi-Homomorphic Encryption and Multiparty Computation , 2011, IACR Cryptol. ePrint Arch..
[20] Ivan Damgård,et al. Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[21] Alex J. Malozemoff,et al. Efficient Three-Party Computation from Cut-and-Choose , 2014, CRYPTO.
[22] Yehuda Lindell,et al. Secure Multi-Party Computation without Agreement , 2005, Journal of Cryptology.
[23] Dan Bogdanov,et al. Sharemind: A Framework for Fast Privacy-Preserving Computations , 2008, ESORICS.
[24] Moti Yung,et al. Secure Multi-party Computation Minimizing Online Rounds , 2009, ASIACRYPT.
[25] Jonathan Katz,et al. Improving the round complexity of VSS in point-to-point networks , 2009, Inf. Comput..
[26] Yuval Ishai,et al. On 2-Round Secure Multiparty Computation , 2002, CRYPTO.
[27] Vinod Vaikuntanathan,et al. Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE , 2012, EUROCRYPT.