Topology-Hiding Communication from Minimal Assumptions
暂无分享,去创建一个
Tal Malkin | Pierre Meyer | Elette Boyle | Lisa Kohl | Tal Moran | Marshall Ball | Ran Cohen | T. Moran | T. Malkin | Pierre Meyer | Ran Cohen | Elette Boyle | Lisa Kohl | Marshall Ball
[1] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[2] Rafail Ostrovsky,et al. Cryptography from Anonymity , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[3] Ueli Maurer,et al. Topology-Hiding Computation Beyond Semi-Honest Adversaries , 2018, IACR Cryptol. ePrint Arch..
[4] Silvio Micali,et al. A Completeness Theorem for Protocols with Honest Majority , 1987, STOC 1987.
[5] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[6] Ueli Maurer,et al. Topology-Hiding Computation for Networks with Unknown Delays , 2020, IACR Cryptol. ePrint Arch..
[7] Sampath Kannan,et al. The relationship between public key encryption and oblivious transfer , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[8] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[9] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[10] Avi Wigderson,et al. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract) , 1988, STOC.
[11] Joe Kilian,et al. A general completeness theorem for two party games , 1991, STOC '91.
[12] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[13] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[14] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[15] Silas Richelson,et al. Topology-Hiding Computation , 2015, TCC.
[16] Tal Moran,et al. Topology-Hiding Computation on All Graphs , 2017, CRYPTO.
[17] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[18] Tal Malkin,et al. Is Information-Theoretic Topology-Hiding Computation Possible? , 2019, IACR Cryptol. ePrint Arch..
[19] Tal Moran,et al. Topology-Hiding Computation Beyond Logarithmic Diameter , 2017, EUROCRYPT.
[20] Ueli Maurer,et al. Network-Hiding Communication and Applications to Multi-Party Protocols , 2016, IACR Cryptol. ePrint Arch..