The All-or-Nothing Nature of Two-Party Secure Computation
- 16 December 1999
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- A Secure Protocol for the Oblivious Transfer (Extended Abstract)Journal of Cryptology, 1996
- A Zero-One Law for Boolean PrivacySIAM Journal on Discrete Mathematics, 1991
- The Knowledge Complexity of Interactive Proof SystemsSIAM Journal on Computing, 1989
- One-way functions are essential for complexity based cryptographyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1989
- Multiparty unconditionally secure protocolsPublished by Association for Computing Machinery (ACM) ,1988
- How to Solve any Protocol Problem - An Efficiency Improvement (Extended Abstract)Published by Springer Nature ,1988
- Equivalence Between Two Flavours of Oblivious TransfersPublished by Springer Nature ,1988
- Achieving oblivious transfer using weakened security assumptionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1988
- How to play ANY mental gamePublished by Association for Computing Machinery (ACM) ,1987
- A randomized protocol for signing contractsCommunications of the ACM, 1985