Server-Aided Two-Party Computation with Minimal Connectivity in the Simultaneous Corruption Model
暂无分享,去创建一个
[1] Yuval Ishai,et al. Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator , 2005, CRYPTO.
[2] Rafail Ostrovsky,et al. Constant-Rate Oblivious Transfer from Noisy Channels , 2011, CRYPTO.
[3] Yuval Ishai,et al. OT-Combiners via Secure Computation , 2008, TCC.
[4] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[5] Yuval Ishai,et al. Founding Cryptography on Oblivious Transfer - Efficiently , 2008, CRYPTO.
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.
[7] Moni Naor,et al. On Robust Combiners for Oblivious Transfer and Other Primitives , 2005, EUROCRYPT.
[8] Matthias Fitzi,et al. General Adversaries in Unconditional Multi-party Computation , 1999, ASIACRYPT.
[9] Ueli Maurer,et al. General Secure Multi-party Computation from any Linear Secret-Sharing Scheme , 2000, EUROCRYPT.
[10] Mariana Raykova,et al. Outsourcing Multi-Party Computation , 2011, IACR Cryptol. ePrint Arch..
[11] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[12] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[13] Amos Beimel,et al. Secret-Sharing Schemes: A Survey , 2011, IWCC.
[14] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .
[15] Ueli Maurer,et al. Player Simulation and General Adversary Structures in Perfect Multiparty Computation , 2000, Journal of Cryptology.
[16] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[17] Ran Canetti,et al. Universally Composable Security with Local Adversaries , 2012, SCN.
[18] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..