Author:
Dodis Yevgeniy,Micali Silvio
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. D. Beaver, Foundations of Secure Interactive Computing. Proc. of CRYPTO’91, pp. 377–391, 1991.
2. D. Beaver, Secure multi-party protocols and zero-knowledge proof systems tolerating a faulty majority. Journal of Cryptology, 4(2), pp. 75–122, 1991.
3. D. Beaver and S. Goldwasser, Multi-party computation with faulty majority, Proc. of the 30th FOCS, pp. 468–473, 1989.
4. M. Ben-Or, S. Goldwasser and A. Wigderson, Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation, Proc. of the 20th STOC, pp. 1–10, 1998.
5. R. Canetti, Security and Composition of Multi-party Cryptographic Protocols. Journal of Cryptology, 13(1):143–202.
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献