Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/100216.100287acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free access

The round complexity of secure protocols

Published: 01 April 1990 Publication History
First page of PDF

References

[1]
[BB89] J. Bar-Ilan and D. Beaver, "Non-Cryptographic Fault Tolerant Computing in a Constant Number of Rounds of Interaction," Proc. of the 8th PODC (1989), 201-209.
[2]
[Be88] D. Beaver, "Secure Multiparty Protocols Tolerating Half Faulty Processors," Harvard Technical Report TR-19-88, and in CRYPTO-89 Proceedings.
[3]
[Be90] D. Beaver, "Security, Fault-Tolerance, and Communication Complexity for Distributed Systems," Harvard University Ph.D. Thesis, 1990.
[4]
[BFKR89] D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway, "Cryptographic Applications of Locally Random Reductions," Bell Laboratories Technical Memorandum, November 1989. Also a 1990 PODC submission, "Security with Low Communication Overhead."
[5]
[BG89] D. Beaver and S. Goldwasser, "Multiparty Computations with Faulty Majority," CRYPTO-89 Proceedings.
[6]
[BE88] M. Ben-Or and R. El-Yaniv, "Interactive Consistency in Constant Expected Time," manuscript, December 1988.
[7]
[BGW88] M. Ben-Or, S. Goldwasser and A. Wigderson, "Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation," Proc. of the 20th STOC (1988), 1-10.
[8]
[BM82] M. Blum and S. Micali, "How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits," SIAM J. of Computing, 13:850-864 (1984), and FOCS 82.
[9]
[Ch89] D. Chaum, "The Spymasters Double-Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities," CRYPTO-89 Proceeding.
[10]
[CCD88] D. Chaum, C. Crépeau and I. Damgård, "Multiparty Unconditionally Secure Protocols," Proc. of the 20th STOC (1988), 11-19.
[11]
[CDG87] D. Chaum, I. Damgård and J. van de Graff, "Multiparty Computations Ensuring the Privacy of Each Party's Input and Correctness of the Result," CRYPTO-87 Proceedings, 87-119.
[12]
[CGMA85] B. Chor, O. Goldreich, S. Micali and B. Awerbuch, "Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults," Proc. of the 26th FOCS (1985), 383-395.
[13]
[CR87] B. Chor and M. Rabin, "Achieving Independence in Logarithmic Number of Rounds," Proc. of the 6th PODC (1987).
[14]
[Fe88] P. Feldman, "One Can Always Assume Private Channels," unpublished manuscript (1988).
[15]
[FM88] P. Feldman and S. Micali, "Optimal Algorithms for Byzantine Agreement," Proc. of the 20th STOC (1988), 148-161.
[16]
[GHY87] Z. Galil, S. Haber and M. Yung, "Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model," CRYPTO-87 Proceedings, 135-155.
[17]
[GMW87] O. Goldreich, S. Micali and A. Wigderson, "How to Play Any Mental Game," Proc. of the 19th STOC (1987), 218-229.
[18]
[GV87] O. Goldreich and R. Vainish, "How to Solve any Protocol Problem--An Efficiency Improvement," CRYPTO-87 Proceedings, 76-86.
[19]
[Ha88] S. Haber, "Multi-Party Cryptographic Computation: Techniques and Applications," Columbia University Ph.D. Thesis (1988).
[20]
[Ha90] J. Håstad, "Pseudo-Random Generators with Uniform Assumptions," these proceedings.
[21]
[KMR90] J. Kilian, S. Micali and P. Rogaway, "The Notion of Secure Computation," manuscript, March 1990.
[22]
[ILL89] R. Impagliazzo, L. Levin and M. Luby, "Pseudo-Random Generation from One-Way Functions," Proc. of the 21st STOC (1989), 12-23.
[23]
[RB89] T. Rabin and M. Ben-Or, "Verifiable Secret Sharing and Multiparty Protocols with Honest Majority," Proc. of the 21st STOC (1989), 73-85.
[24]
[Ro90] P. Rogaway, "The Round Complexity of Secure Protocols," MIT Ph.D. Thesis (1990).
[25]
[Ya82a] A. Yao, Protocols for Secure Computation, Proc. of the 23rd FOCS (1982) 160-164.
[26]
[Ya82b] A. Yao, "Theory and Applications of Trapdoor Functions," Proc. of the 23rd FOCS (1982) 80-91.
[27]
[Ya86] A. Yao, "How to Generate and Exchange Secrets," Proc. of the 18th STOC (1986) 162-167.

Cited By

View all
  • (2024)A Ciphertext Reduction Scheme for Garbling an S-Box in an AES Circuit with Minimal Online TimeSymmetry10.3390/sym1606066416:6(664)Online publication date: 28-May-2024
  • (2024)Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumptionJournal of Cloud Computing10.1186/s13677-023-00586-513:1Online publication date: 22-Jan-2024
  • (2024)Nomadic: Normalising Maliciously-Secure Distance with Cosine Similarity for Two-Party Biometric AuthenticationProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3657022(257-273)Online publication date: 1-Jul-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC '90: Proceedings of the twenty-second annual ACM symposium on Theory of Computing
April 1990
574 pages
ISBN:0897913612
DOI:10.1145/100216
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 April 1990

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

STOC90
Sponsor:
STOC90: 22nd Annual ACM Symposium on Theory of Computing
May 13 - 17, 1990
Maryland, Baltimore, USA

Acceptance Rates

Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)406
  • Downloads (Last 6 weeks)52
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Ciphertext Reduction Scheme for Garbling an S-Box in an AES Circuit with Minimal Online TimeSymmetry10.3390/sym1606066416:6(664)Online publication date: 28-May-2024
  • (2024)Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumptionJournal of Cloud Computing10.1186/s13677-023-00586-513:1Online publication date: 22-Jan-2024
  • (2024)Nomadic: Normalising Maliciously-Secure Distance with Cosine Similarity for Two-Party Biometric AuthenticationProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3657022(257-273)Online publication date: 1-Jul-2024
  • (2024)Cryptographic Primitives in Privacy-Preserving Machine Learning: A SurveyIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.332180336:5(1919-1934)Online publication date: May-2024
  • (2024)Fast Evaluation of S-Boxes With Garbled CircuitsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.340214519(5530-5544)Online publication date: 2024
  • (2024)Extremely Efficient and Privacy-Preserving MAX/MIN Protocol Based on Multiparty Computation in Big DataIEEE Transactions on Consumer Electronics10.1109/TCE.2024.336045570:1(3042-3055)Online publication date: Feb-2024
  • (2024)Olympia: A Simulation Framework for Evaluating the Concrete Scalability of Secure Aggregation Protocols2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML)10.1109/SaTML59370.2024.00033(534-551)Online publication date: 9-Apr-2024
  • (2024)Private-preserving language model inference based on secure multi-party computationNeurocomputing10.1016/j.neucom.2024.127794592(127794)Online publication date: Aug-2024
  • (2024)Tree-based quantum anonymous ranking protocolQuantum Information Processing10.1007/s11128-024-04476-w23:7Online publication date: 5-Jul-2024
  • (2024)Secure two-party computation via measurement-based quantum computingQuantum Information Processing10.1007/s11128-024-04433-723:6Online publication date: 1-Jun-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media