Fair Computation of General Functions in Presence of Immoral Majority
- 18 May 2001
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 18 references indexed in Scilit:
- Verifiable secret sharing and multiparty protocols with honest majorityPublished by Association for Computing Machinery (ACM) ,1989
- Interactive proof systemsProceedings of Symposia in Applied Mathematics, 1989
- Multiparty unconditionally secure protocolsPublished by Association for Computing Machinery (ACM) ,1988
- Direct Minimum-Knowledge Computations (Extended Abstract)Published by Springer Nature ,1988
- Gradual and Verifiable Release of a Secret (Extended Abstract)Published by Springer Nature ,1988
- Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model (Extended Abstract)Published by Springer Nature ,1988
- Achieving independence in logarithmic number of roundsPublished by Association for Computing Machinery (ACM) ,1987
- How to play ANY mental gamePublished by Association for Computing Machinery (ACM) ,1987
- How to generate and exchange secretsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1986
- Protocols for secure computationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982