Asynchronous Secure Multiparty Computation in Constant Time
暂无分享,去创建一个
[1] C. Pandu Rangan,et al. Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience , 2009, Inscrypt.
[2] Ivan Damgård,et al. Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems , 2010, TCC.
[3] Ran Canetti,et al. Fast asynchronous Byzantine agreement with optimal resilience , 1993, STOC.
[4] K. Srinathan,et al. Asynchronous Unconditionally Secure Computation: An Efficiency Improvement , 2002, INDOCRYPT.
[5] Elaine Shi,et al. Constant-Round MPC with Fairness and Guarantee of Output Delivery , 2015, CRYPTO.
[6] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[7] Ashish Choudhury,et al. Asynchronous MPC with a strict honest majority using non-equivocation , 2014, PODC '14.
[8] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[9] Adi Shamir,et al. How to share a secret , 1979, CACM.
[10] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[11] Daniel Wichs,et al. Two Round MPC from LWE via Multi-Key FHE , 2015, IACR Cryptol. ePrint Arch..
[12] Craig Gentry,et al. Two-Round Secure MPC from Indistinguishability Obfuscation , 2014, TCC.
[13] Sam Toueg,et al. Randomized Byzantine Agreements , 1984, PODC '84.
[14] Martin Hirt,et al. Asynchronous Multi-Party Computation with Quadratic Communication , 2008, ICALP.
[15] C. Pandu Rangan,et al. Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation , 2013, Journal of Cryptology.
[16] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[17] Ashish Choudhury,et al. Asynchronous Multiparty Computation with Linear Communication Complexity , 2013, DISC.
[18] Gabriel Bracha,et al. An asynchronous [(n - 1)/3]-resilient consensus protocol , 1984, PODC '84.
[19] Tal Rabin,et al. Asynchronous secure computations with optimal resilience (extended abstract) , 1994, PODC '94.
[20] Vinod Vaikuntanathan,et al. Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE , 2012, EUROCRYPT.
[21] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[22] Ivan Damgård,et al. Simplified Threshold RSA with Adaptive and Proactive Security , 2006, EUROCRYPT.
[23] Rafail Ostrovsky,et al. Robust Non-interactive Zero Knowledge , 2001, CRYPTO.
[24] Nancy A. Lynch,et al. Impossibility of distributed consensus with one faulty process , 1985, JACM.
[25] K. Srinathan,et al. Efficient Asynchronous Secure Multiparty Distributed Computation , 2000, INDOCRYPT.
[26] Juan A. Garay,et al. Strengthening Zero-Knowledge Protocols Using Signatures , 2003, EUROCRYPT.
[27] Ran Canetti,et al. Universal Composition with Joint State , 2003, CRYPTO.
[28] Silvio Micali,et al. The Round Complexity of Secure Protocols (Extended Abstract) , 1990, STOC 1990.
[29] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[30] Chris Peikert,et al. How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE , 2013, ACNS.
[31] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[32] Yuval Ishai,et al. Founding Cryptography on Oblivious Transfer - Efficiently , 2008, CRYPTO.
[33] Martin Hirt,et al. Cryptographic Asynchronous Multi-party Computation with Optimal Resilience (Extended Abstract) , 2005, EUROCRYPT.
[34] Ran Canetti,et al. Asynchronous secure computation , 1993, STOC.
[35] Ashish Choudhury,et al. Optimally Resilient Asynchronous MPC with Linear Communication Complexity , 2015, ICDCN.
[36] R. Cramer,et al. Multiparty Computation from Threshold Homomorphic Encryption , 2000 .
[37] Silvio Micali,et al. The round complexity of secure protocols , 1990, STOC '90.
[38] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[39] Ueli Maurer,et al. Universally Composable Synchronous Computation , 2013, TCC.
[40] Martin Hirt,et al. On the theoretical gap between synchronous and asynchronous MPC protocols , 2010, PODC '10.
[41] Martin Hirt,et al. Simple and Efficient Perfectly-Secure Asynchronous MPC , 2007, ASIACRYPT.
[42] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[43] Jesper Buus Nielsen,et al. A Threshold Pseudorandom Function Construction and Its Applications , 2002, CRYPTO.
[44] Ran El-Yaniv,et al. Resilient-optimal interactive consistency in constant time , 2003, Distributed Computing.