A Dynamic Tradeoff Between Active and Passive Corruptions in Secure Multi-Party Computation
暂无分享,去创建一个
[1] Moti Yung,et al. Perfectly secure message transmission , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.
[2] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[3] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[4] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[5] Jonathan Katz. On achieving the "best of both worlds" in secure multiparty computation , 2007, STOC '07.
[6] Manuel Blum. How to exchange (secret) keys , 1983, STOC '83.
[7] Donald Beaver,et al. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority , 2004, Journal of Cryptology.
[8] Ueli Maurer,et al. Hybrid-secure MPC: trading information-theoretic robustness for computational privacy , 2010, IACR Cryptol. ePrint Arch..
[9] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[10] Ueli Maurer,et al. MPC vs. SFE : Unconditional and Computational Security , 2008, ASIACRYPT.
[11] Danny Dolev,et al. Polynomial algorithms for multiple processor agreement , 1982, STOC '82.
[12] Ueli Maurer,et al. Graceful Degradation in Multi-Party Computation (Extended Abstract) , 2011, ICITS.
[13] Ueli Maurer,et al. Passive Corruption in Statistical Multi-Party Computation , 2012, IACR Cryptology ePrint Archive.
[14] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[15] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[16] Manuel Blum. How to Exchange (Secret) Keys (Extended Abstract) , 1983, STOC 1983.
[17] Adi Shamir,et al. How to share a secret , 1979, CACM.
[18] Matthias Fitzi,et al. Multi-party Computation with Hybrid Security , 2004, EUROCRYPT.
[19] Matthias Fitzi,et al. Two-Threshold Broadcast and Detectable Multi-party Computation , 2003, EUROCRYPT.
[20] Ueli Maurer,et al. Graceful Degradation in Multi-Party Computation , 2011, IACR Cryptol. ePrint Arch..
[21] Yehuda Lindell,et al. On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation , 2006, CRYPTO.
[22] David Chaum,et al. The Spymasters Double-Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities , 1989, CRYPTO.
[23] Matthias Fitzi,et al. Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract) , 1998, CRYPTO.
[24] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.