An Asynchronous Multi-Party Computation Protocol
暂无分享,去创建一个
[1] Matthew K. Franklin,et al. Joint Encryption and Message-Efficient Secure Computation , 1993, CRYPTO.
[2] K. Srinathan,et al. Efficient Asynchronous Secure Multiparty Distributed Computation , 2000, INDOCRYPT.
[3] Victor Shoup,et al. Practical Threshold Signatures , 2000, EUROCRYPT.
[4] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[5] Tal Rabin,et al. Asynchronous secure computations with optimal resilience (extended abstract) , 1994, PODC '94.
[6] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[7] R. Cramer,et al. Multiparty Computation from Threshold Homomorphic Encryption , 2000 .
[8] K. Srinathan,et al. Asynchronous Unconditionally Secure Computation: An Efficiency Improvement , 2002, INDOCRYPT.
[9] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[10] Yehuda Lindell,et al. Secure Computation without Agreement , 2002, DISC.
[11] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[12] Ran Canetti,et al. Studies in secure multiparty computation and applications , 1995 .
[13] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[14] Jesper Buus Nielsen,et al. A Threshold Pseudorandom Function Construction and Its Applications , 2002, CRYPTO.
[15] Jacques Stern,et al. Sharing Decryption in the Context of Voting or Lotteries , 2000, Financial Cryptography.
[16] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[17] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[18] Ran Canetti,et al. Asynchronous secure computation , 1993, STOC.