skip to main content
10.1145/237814.238015acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

Adaptively secure multi-party computation

Authors Info & Claims
Published:01 July 1996Publication History
First page image

References

  1. B.E. Bach, "How to generate factored random numbers", SIAM J. on Cornput., Vol. 17, No. 2, 1988, pp. 179-193. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Be1.D. Beaver, "Foundations of Secure Interactive Computing", CRYPTO, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Be2.D. Beaver, "Adaptive Zero Knowledge and Computational Equivocation", these proceedings. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. BH.D. Beaver and S. Haber, "Cryptographic Protocols Provably secure Against Dynamic Adversaries", Eurocrypt, 1992.Google ScholarGoogle Scholar
  5. BGW.M. Ben-Or, S. Goldwasser and A. Wigderson, "Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation", 20th STOC, pp. 1-10, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. BM.M. Blum, and S. Micali, "How to generate Cryptographically strong sequences of pseudo-random bits", SIAM J. on Computing, Vol. 13, 1984, pp. 850-864. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. BCC.G. Brassard, D. Chaum and C. Crepeau, "Minimum Disclosure Proofs of Knowledge", JCSS, Vol. 37, No. 2, 1988, pp. 156-189. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C.R. Canetti, "Studies in Secure Multi-Party Computation and Applications", Ph.D. Thesis, Department of Computer Science and Applied Math, Weizmann Institute of Science, Rehovot, Israel, June 1995.Google ScholarGoogle Scholar
  9. CDNO.R. Canetti, C. Dwork, M. Naor and R. Ostrovsky, "Deniable Encryptions", manuscript.Google ScholarGoogle Scholar
  10. CFGN.R. Canetti, U. Feige, O. Goldreich and M. Naor, "Adaptively Secure Multi-party Computation", MIT LCS TR number 682, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. CCD.D. Chaum, C. Crepeau and I Damgard, "Multi-party unconditionally secure protocols", 20th STOC, pp. 11-19, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. DP.A. De-Santis and G. Persiano, "Zero-Knowledge proofs of knowledge without interaction", 33rd FOCS, pp. 427-436, 1992.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. EGL.S. Even, O. Goldreich and A. Lempel, "A randomized protocol for signing contracts", CACM, vol. 28, No. 6, 1985, pp. 637-647. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. F.P. Feldman, personal communication via Cynthia Dwork, 1988.Google ScholarGoogle Scholar
  15. GILVZ.O. Goldreich, R. Impagliazzo, L. Levin, R. Venkatesan and D. Zuckerman, "Security Preserving Amplification of Hardness", 31st FOCS, i990, pp. 318-326.Google ScholarGoogle Scholar
  16. GrL.O. Goldreich and L. Levin, "A Hard-Core Predicate to any One-Way Function", 21st STOC, 1989, pp. 25-32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. GMW.O. Goldreich, S. Micali and A. Wigderson, "How to Play any Mental Game", 19th STOC, pp. 218-229, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. GwL.S. Goldwasser and L. Levin, "Fair Computation of General Functions in Presence of Immoral Majority", CRYPTO, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. MR.S. Micali and P. Rogaway, "Secure Computation", CRYPTO, 199 t.Google ScholarGoogle Scholar
  20. R.M. Rabin, "How to exchange secrets by oblivious transfer", Tech. Memo TR-81, Aiken Computation Laboratory, Harvard U., 1981.Google ScholarGoogle Scholar
  21. RB.T. Rabin and M. Ben-Or, "Verifiable Secret Sharing and Multi-party Protocols with Honest Majority", 21st STOC, 1989, pp. 73-85. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. RSA.R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems", CACM, Vol. 21, Feb. 1978, pp. 12o-126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Y.A. Yao, "Theory and applications of trapdoor functions", 23rd FOCS, 1982, pp. 80-91.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Adaptively secure multi-party computation

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            STOC '96: Proceedings of the twenty-eighth annual ACM symposium on Theory of Computing
            July 1996
            661 pages
            ISBN:0897917855
            DOI:10.1145/237814

            Copyright © 1996 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 July 1996

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            STOC '96 Paper Acceptance Rate74of201submissions,37%Overall Acceptance Rate1,469of4,586submissions,32%

            Upcoming Conference

            STOC '24
            56th Annual ACM Symposium on Theory of Computing (STOC 2024)
            June 24 - 28, 2024
            Vancouver , BC , Canada

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader