Publication:4035733

From MaRDI portal


zbMath0789.68044MaRDI QIDQ4035733

Donald Beaver

Publication date: 18 May 1993



68P25: Data encryption (aspects in computer science)

68W15: Distributed algorithms


Related Items

Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries, Efficient Fully-Simulatable Oblivious Transfer, Statistical Security Conditions for Two-Party Secure Function Evaluation, Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model, Scalable Multi-party Private Set-Intersection, Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries, Efficient set intersection with simulation-based security, Automata evaluation and text search protocols with simulation-based security, Fast cut-and-choose-based protocols for malicious and covert adversaries, Partial fairness in secure two-party computation, Impossibility results for universal composability in public-key models and with fixed inputs, A full proof of the BGW protocol for perfectly secure multiparty computation, Computationally secure pattern matching in the presence of malicious adversaries, Private multiparty sampling and approximation of vector combinations, A proof of security of Yao's protocol for two-party computation, General composition and universal composability in secure multiparty computation, Secure multiplication of shared secrets in the exponent, Distributed anonymous data perturbation method for privacy-preserving data mining, Robust threshold DSS signatures, Secure two-party computation via cut-and-choose oblivious transfer, Abstractions of non-interference security: probabilistic versus possibilistic, Obfuscation for cryptographic purposes, Security against covert adversaries: Efficient protocols for realistic adversaries, An efficient protocol for secure two-party computation in the presence of malicious adversaries, Lower bounds and impossibility results for concurrent self composition, GNUC: a new universal composability framework, Simplified Universal Composability Framework, Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions, What Security Can We Achieve Within 4 Rounds?, Compact and Efficient UC Commitments Under Atomic-Exchanges, Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity, Composable Adaptive Secure Protocols Without Setup Under Polytime Assumptions, Constant-Round Maliciously Secure Two-Party Computation in the RAM Model, Anonymous Communication and Anonymous Cash, Composable Security in the Bounded-Quantum-Storage Model, Oblivious Transfer Is Symmetric, Information-Theoretic Conditions for Two-Party Secure Function Evaluation, Adaptively Secure Two-Party Computation with Erasures, Local Sequentiality Does Not Help for Concurrent Composition