References
- A. C. Yao, 'Protocols for Secure Computation', Proc. of IEEE FOCS ' 82, pp. 160-164, 1982
- O. Goldreich, S. Micah and A. Wigderson, 'How to Play Any Mental Game or Completeness Theorem for Protocols with Honest Majority', Proc. of ACM STOC '87, pp. 218-229, 1987
- O. Goldreich, 'Secure Multi-Party Computation (Final (incomplete) Draft, Version 1.4)', available at http//www.wisdom.weizmann.ac.il/~oded/PS/prot.ps
- R. Cramer, 'Introduction to Secure Communication', Lecture Note of Aarhus Summer school in Cryptography and Data Security, 2000
- S. Even, O. Goldreich and A. Lempel, 'A Randomized Protocol for Signing Contract', Communications of the ACM, vol. 28, 1985
- A. Shamir, 'How to Share a Secret', Communications of the ACM, vol. 22, 1979 https://doi.org/10.1145/359168.359176
- P. Feldman, 'A Practical Scheme for Non-interactive Verifiable Secret Sharing', Proc. of IEEE FOCS '87, pp. 427 -437, 1987
- O. Goldreich and R. Vainish, 'How to Solve any Protocol Problem: An Efficiency Improvement', Proc. of Crypto '87, pp. 73-86, 1987
- M. Fitzi, T. Holenstein and J. Wull-schleger, 'Multi-party Computation with Hybrid Security', Proc. of Eurocrypt 2004, pp. 419-438, 2004
- R. Canetti, 'Universally Composable Security: A New Security Paradigms for Cryptographic Protocols(Extended Abstract)', Proc. of 42th IEEE FOCS, pp. 136-145, 2001
- Bar-Ilan and D. Beaver, 'Non-Cryptographic Fault-Tolerant Computing in a Constant Number of Rounds', Proc. of 8th ACM PODC, pp. 201-209, 1989
- D. Beaver, S. Micali and P. Rogaway, 'The Round Complexity of Secure Protocols(Extended Abstract)', Proc. of 22th ACM STOC, pp. 503-513, 1990
- U. Feige, J. Kilian and M. Naor, 'A Minimal Model for Secure Computation(Extended Abstract)', Proc. of 26th ACm STOC, pp. 554-563, 1994
- Y. Ishai and E. Dushilevitz, 'Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation', Proc. of 41th ACM FOCS, 2000
- Y. Lindell, 'Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation', Proc. of Crypto 2001, pp. 171-189, 2001
- R. Gennaro, Y. Ishai, E. Kushilevitz and T. Rabin, 'The Round Complexity of Verifiable Secret Sharing and Secure Multicast', Proc. of 33th ACM STOC, 2001
- R. Gennaro, Y. Ishai, E. Kushilevitz and T. Rabin, 'On 2-Round Secure Multiparty Computation', Proc. of Crypto 2002, pp. 178-193, 2002
- D. Beaver, J. Feigenbaum, J. Kilian and P. Rogaway, 'Security with Low Communication Overhead(Extended Abstract)', Proc. of Crypto '90, pp. 62-76, 1990
- M. Hirt, U. Maurer and B. Przydatek, 'Efficient Secure Multi-party Computation(Extended Abstract)', Proc. of Asysacrypt 2000, pp. 143-161, 2000
- M. Rirt and U. Maurer, 'Robustness for Free in Unconditional Multi-party Computation', Proc. of Crypto 2001. pp. 101-118, 2001
- R. Cramer, I. Damgard and J. B. Nielsen, 'Multipary Computation from Threshold Homomorphic Encryption', Proc. of Eurocrypt 2001, pp. 280-300, 2001
- R. Cramer, I. Damgard, S. Dziembowski, M. Hirt and T. Rabin, 'Efficient Multiparty Computation Secure against an Adaptive Adversary', Proc. of Eurccrypt '99, pp. 311-326, 1999
- Y. Lindell and Benny Pinkas, 'Privacy Preserving Data Mining', Proc. of Crypto 2000, pp. 36-54, 2000
- W. Du and M. J. Atallah, 'Privacy-Preserving Cooperative Scientific Computations', Proc. of 14th IEEE Computer Security Foundations Workshop, pp. 273-282, 2001
- W. Du and M. J. Atallah, 'Prptocols for Secure Remote Database Access with Approximate Matching', Proc. of ACMCCS 2000, 2000
- M. J. Atallah and W. Du, 'Secure Multi -Party Computational Geometry', Proc. of WADS 2001, 2001
- W. Du and M. J. Atallah, 'Secure Multi-Party Computation Problems and Applications: A Review and Open Problems', Proc. of New Security Paradigms Workshop, 2001
- W. Du and Z. Zhan, 'A Practical Approach to Solve Secure Multi-Party Computation Problems', Proc. of New Security Paradigms Workshop, 2002
- R. Cramer, S. Fehr, Y. Ishai and E. Kushilevitz, 'Efficient Multi-party Computation over Rings', Proc. of Eurccrypt 2003, pp. 596-613, 2003
- M. Fitzi, M. Hirt, T. Holenstein and J. Wullschleger, 'Two-Threshold Broadcast and Detectable Multi-Party Computation', Proc. of Eurocrypt 2003, pp. 5167, 2003