Fair Two-Party Computations via Bitcoin Deposits
暂无分享,去创建一个
Marcin Andrychowicz | Stefan Dziembowski | Daniel Malinowski | Lukasz Mazurek | Marcin Andrychowicz | Stefan Dziembowski | Daniel Malinowski | Lukasz Mazurek
[1] Justin M. Reyneri,et al. Coin flipping by telephone , 1984, IEEE Trans. Inf. Theory.
[2] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[3] A. Yao. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[4] Silvio Micali,et al. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[5] Richard Cleve,et al. Limits on the security of coin flips when half the processors are faulty , 1986, STOC '86.
[6] Oded Goldreich,et al. How to Solve any Protocol Problem - An Efficiency Improvement , 1987, CRYPTO.
[7] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[8] Silvio Micali,et al. A fair protocol for signing contracts , 1990, IEEE Trans. Inf. Theory.
[9] Dieter Gollmann,et al. Certified Electronic Mail , 1996, ESORICS.
[10] Elisa Bertino,et al. Computer Security — ESORICS 96 , 1996, Lecture Notes in Computer Science.
[11] Dieter Gollmann,et al. A fair non-repudiation protocol , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[12] Birgit Pfitzmann,et al. Optimal efficiency of optimistic contract signing , 1998, PODC '98.
[13] Ronald Cramer,et al. Introduction to Secure Computation , 1998, Lectures on Data Security.
[14] Moni Naor,et al. Timed Commitments , 2000, CRYPTO.
[15] Mihir Bellare. Advances in Cryptology — CRYPTO 2000 , 2000, Lecture Notes in Computer Science.
[16] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[17] Tor Helleseth,et al. Advances in Cryptology — EUROCRYPT ’93 , 2001, Lecture Notes in Computer Science.
[18] Martín Abadi,et al. Certified email with a light on-line trusted third party: design and implementation , 2002, WWW.
[19] Cristina Nita-Rotaru,et al. Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption , 2002, CT-RSA.
[20] Markus Jakobsson,et al. Timed Release of Standard Digital Signatures , 2002, Financial Cryptography.
[21] Bart Preneel,et al. Topics in Cryptology — CT-RSA 2002 , 2002, Lecture Notes in Computer Science.
[22] Ivan Damgård,et al. Lectures on Data Security , 2003, Lecture Notes in Computer Science.
[23] Benny Pinkas,et al. Fair Secure Two-Party Computation , 2003, EUROCRYPT.
[24] Ivan Damgård,et al. Practical and provably secure release of a secret and exchange of signatures , 1994, Journal of Cryptology.
[25] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[26] Alfred Menezes,et al. Topics in Cryptology – CT-RSA 2005 , 2005 .
[27] Victor Vianu,et al. Invited articles section foreword , 2010, JACM.
[28] Joseph Bonneau,et al. What's in a Name? , 2020, Financial Cryptography.
[29] Yehuda Lindell,et al. Complete Fairness in Secure Two-Party Computation , 2011, JACM.
[30] Jeremy Clark,et al. CommitCoin: Carbon Dating Commitments with Bitcoin , 2011, IACR Cryptol. ePrint Arch..
[31] Jeremy Clark,et al. CommitCoin: Carbon Dating Commitments with Bitcoin - (Short Paper) , 2012, Financial Cryptography.
[32] Elaine Shi,et al. Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.
[33] Marcin Andrychowicz,et al. How to deal with malleability of BitCoin transactions , 2013, ArXiv.
[34] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.
[35] Marcin Andrychowicz,et al. Secure Multiparty Computations on Bitcoin , 2014, IEEE Symposium on Security and Privacy.
[36] Iddo Bentov,et al. Note on fair coin toss via Bitcoin , 2014, ArXiv.