Efficient Multiparty Protocols Using Circuit Randomization
Top Cited Papers
- 18 May 2001
- book chapter
- Published by Springer Nature
- p. 420-432
- https://doi.org/10.1007/3-540-46766-1_34
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- The round complexity of secure protocolsPublished by Association for Computing Machinery (ACM) ,1990
- Non-cryptographic fault-tolerant computing in constant number of rounds of interactionPublished by Association for Computing Machinery (ACM) ,1989
- Verifiable secret sharing and multiparty protocols with honest majorityPublished by Association for Computing Machinery (ACM) ,1989
- Multiparty computation with faulty majorityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1989
- Multiparty unconditionally secure protocolsPublished by Association for Computing Machinery (ACM) ,1988
- Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model (Extended Abstract)Published by Springer Nature ,1988
- Completeness theorems for non-cryptographic fault-tolerant distributed computationPublished by Association for Computing Machinery (ACM) ,1988
- How to play ANY mental gamePublished by Association for Computing Machinery (ACM) ,1987
- Proofs that yield nothing but their validity and a methodology of cryptographic protocol designPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1986
- How to share a secretCommunications of the ACM, 1979