Author:
Canetti Ran,Dodis Yevgeniy,Pass Rafael,Walfish Shabsi
Publisher
Springer Berlin Heidelberg
Reference32 articles.
1. Lecture Notes in Computer Science;M. Abe,2007
2. Ateniese, G., de Medeiros, B.: Identity-based Chameleon Hash and Applications. In: Proc. of Financial Cryptography (2004), Available at,
http://eprint.iacr.org/2003/167/
3. Beaver, D.: Secure Multi-party Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority. J. Cryptology 4, 75–122 (1991)
4. Lecture Notes in Computer Science;B. Barak,2005
5. Barak, B., Canetti, R., Nielsen, J., Pass, R.: Universally composable protocols with relaxed set-up assumptions. In: Proc. of FOCS (2004)
Cited by
161 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献