×

Found 11 Documents (Results 1–11)

A dynamic tradeoff between active and passive corruptions in secure multi-party computation. (English) Zbl 1316.94077

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 203-219 (2013).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Passive corruption in statistical multi-party computation. (Extended abstract). (English) Zbl 1295.94082

Smith, Adam (ed.), Information theoretic security. 6th international conference, ICITS 2012, Montreal, QC, Canada, August 15–17, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32283-9/pbk). Lecture Notes in Computer Science 7412, 129-146 (2012).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Graceful degradation in multi-party computation. (Extended abstract). (English) Zbl 1295.94081

Fehr, Serge (ed.), Information theoretic security. 5th international conference, ICITS 2011, Amsterdam, The Netherlands, May 21–24, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20727-3/pbk). Lecture Notes in Computer Science 6673, 163-180 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Perfectly-secure MPC with linear communication complexity. (English) Zbl 1162.94336

Canetti, Ran (ed.), Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78524-8/pbk). Lecture Notes in Computer Science 4948, 213-230 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient Byzantine agreement with faulty minority. (English) Zbl 1153.94348

Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 393-409 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Simple and efficient perfectly-secure asynchronous MPC. (English) Zbl 1153.94347

Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 376-392 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Optimally efficient multi-valued Byzantine agreement. (English) Zbl 1314.68060

Proceedings of the 25th annual ACM symposium on principles of distributed computing, PODC ’06, Denver, CO, USA, July 23–26, 2006. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-59593-384-0). 163-168 (2006).
PDFBibTeX XMLCite
Full Text: DOI

Efficient secure multi-party computation. (Extended Abstract). (English) Zbl 0966.94010

Okamoto, Tatsuaki (ed.), Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1976, 143-161 (2000).
PDFBibTeX XMLCite

General adversaries in unconditional multi-party computation. (English) Zbl 0977.94029

Lam, Kwok Yan (ed.) et al., Advances in cryptology - ASIACRYPT ’99. International conference on the theory and application of cryptology and information security, Singapore, November 14-18, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1716, 232-246 (1999).
MSC:  94A60 68P25
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field