Proactive Secure Multiparty Computation with a Dishonest Majority
暂无分享,去创建一个
Rafail Ostrovsky | Moti Yung | Sunoo Park | Karim M. El Defrawy | R. Ostrovsky | M. Yung | Sunoo Park
[1] Arvind Narayanan,et al. Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security , 2016, ACNS.
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] Rafail Ostrovsky,et al. How to withstand mobile virus attacks, revisited , 2014, PODC '14.
[4] Stanislaw Jarecki,et al. Proactive RSA with Non-interactive Signing , 2008, Financial Cryptography.
[5] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[6] Rafail Ostrovsky,et al. Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority , 2012, CRYPTO.
[7] Moti Yung,et al. Optimal-resilience proactive public-key cryptosystems , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[8] Rafail Ostrovsky,et al. Communication-Optimal Proactive Secret Sharing for Dynamic Groups , 2015, ACNS.
[9] Silvio Micali,et al. How to play any mental game, or a completeness theorem for protocols with honest majority , 2019, Providing Sound Foundations for Cryptography.
[10] Rafail Ostrovsky,et al. How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.
[11] Alexandra Boldyreva,et al. Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme , 2003, Public Key Cryptography.
[12] Ueli Maurer,et al. A Dynamic Tradeoff Between Active and Passive Corruptions in Secure Multi-Party Computation , 2013, IACR Cryptol. ePrint Arch..
[13] Moti Yung,et al. Adaptive Security for the Additive-Sharing Based Proactive RSA , 2001, Public Key Cryptography.
[14] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[15] Tal Rabin,et al. A Simplified Approach to Threshold and Proactive RSA , 1998, CRYPTO.
[16] Ivan Damgård,et al. Simplified Threshold RSA with Adaptive and Proactive Security , 2006, EUROCRYPT.
[17] Nitesh Saxena,et al. Further Simplifications in Proactive RSA Signatures , 2005, TCC.
[18] Rafail Ostrovsky,et al. Cryptography with constant computational overhead , 2008, STOC.
[19] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[20] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[21] Yuval Ishai,et al. Scalable Multiparty Computation with Nearly Optimal Work and Resilience , 2008, CRYPTO.
[22] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[23] Hugo Krawczyk,et al. Adaptive Security for Threshold Cryptosystems , 1999, CRYPTO.
[24] Rafail Ostrovsky,et al. Proactive Secret Sharing with a Dishonest Majority , 2016, SCN.
[25] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[26] Yuval Ishai,et al. Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography , 2010, IACR Cryptol. ePrint Arch..