Bit commitment using pseudorandomness
暂无分享,去创建一个
[1] Jørn Justesen,et al. Class of constructive asymptotically good algebraic codes , 1972, IEEE Trans. Inf. Theory.
[2] Manuel Blum,et al. Coin Flipping by Telephone. , 1981, CRYPTO 1981.
[3] Manuel Blum,et al. How to Generate Cryptographically Strong Sequences of Pseudo Random Bits , 1982, FOCS.
[4] Andrew Chi-Chih Yao,et al. Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[5] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[6] Andrew Chi-Chih Yao,et al. Theory and Applications of Trapdoor Functions (Extended Abstract) , 1982, FOCS.
[7] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[8] Silvio Micali,et al. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[9] David Chaum,et al. Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result , 1987, CRYPTO.
[10] Moti Yung,et al. Direct Minimum-Knowledge Computations , 1987, CRYPTO.
[11] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[12] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..
[13] Leonid A. Levin,et al. Pseudo-random generation from one-way functions , 1989, STOC '89.
[14] Rafail Ostrovsky,et al. Minimum resource zero knowledge proofs , 1989, 30th Annual Symposium on Foundations of Computer Science.
[15] Russell Impagliazzo,et al. One-way functions are essential for complexity based cryptography , 1989, 30th Annual Symposium on Foundations of Computer Science.
[16] Johan Håstad,et al. Pseudo-random generators under uniform assumptions , 1990, STOC '90.