Minimal Complete Primitives for Secure Multi-party Computation
暂无分享,去创建一个
[1] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[2] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[3] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[4] Leonid A. Levin,et al. Fair Computation of General Functions in Presence of Immoral Majority , 1990, CRYPTO.
[5] Rafail Ostrovsky,et al. Reducibility and completeness in multi-party private computations , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[6] Moti Yung,et al. Perfectly secure message transmission , 1993, JACM.
[7] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[8] Donald Beaver,et al. Foundations of Secure Interactive Computing , 1991, CRYPTO.
[9] Matt Blaze,et al. Oblevious Key Escrow , 1996, Information Hiding.
[10] Shafi Goldwasser,et al. Advances in Cryptology — CRYPTO’ 88: Proceedings , 1990, Lecture Notes in Computer Science.
[11] Vasek Chvátal,et al. The tail of the hypergeometric distribution , 1979, Discret. Math..
[12] Joe Kilian. More general completeness theorems for secure two-party computation , 2000, STOC '00.
[13] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[14] Ivan Damgård,et al. Efficient Multiparty Computations Secure Against an Adaptive Adversary , 1999, EUROCRYPT.
[15] Matthias Fitzi,et al. From partial consistency to global broadcast , 2000, STOC '00.
[16] Joe Kilian,et al. A general completeness theorem for two party games , 1991, STOC '91.
[17] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[18] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[19] Leslie G. Valiant,et al. Universal circuits (Preliminary Report) , 1976, STOC '76.
[20] Rafail Ostrovsky,et al. Reducibility and Completeness in Private Computations , 2000, SIAM J. Comput..
[21] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[22] Silvio Micali,et al. Secure Computation (Abstract) , 1991, CRYPTO.
[23] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[24] Silvio Micali,et al. The All-or-Nothing Nature of Two-Party Secure Computation , 1999, CRYPTO.