Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/167088.167109acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free access

Asynchronous secure computation

Published: 01 June 1993 Publication History
First page of PDF

References

[1]
B. Awerbuch, "The complexity of Network Synchronization", JACM, Vol. 32, no. #, pp. 804-823, 1985.
[2]
M. Ben-Or, S. Goldwasser and A. Wigderson, " Completeness Theorems for Non-Cryptographic Fault- Tolerant Distributed Computation", 20th STOC, pp. 1-10, 1988.
[3]
G. Bracha, "An Asynchronous {(n- 1)/3j-resilient Consensus Protocol", 3rd PODC, pp. 154-162, 1984.
[4]
R. Canetti, "Asynchronous Secure Computation", Techn,cal Report no. 755, CS department, Technion, 1992.
[5]
R. Canetti and T. Rabin, "Fast Asynchronous Byzantine Agreement with Optimal Resilience", these proceedings.
[6]
D. Chaum, C. Crepeau and I. Damgard, "Multiparty unconditionally secure protocols", 20th STOC, pp. 11- 19, 1988.
[7]
B. Chor and E. Kushilevitz, "A Zero-One Law for Boolean Privacy", SIAM J. on Disc. Math., Vol. 4, no. 1, pp. 36-47, 1991.
[8]
B. Chor and L. Moscovici, "Solvability in Asynchronous Environments", 30th FOGS, 1989.
[9]
J. Edmonds, 'Paths, Trees, and Flowers", Canadian J. of Math., Vol.17, pp. 449-467, 1965.
[10]
P. Feldman, "Asynchronous Byzantine Agreement in Constant Expected Time", unpublished manuscript, 1989.
[11]
M. Fischer, N. Lynch and M. Paterson, "Impossibility of Distributed Consensus with One Faulty Process", JACM, Vol. 32, no. 2, pp. 374-382, 1985.
[12]
M.R. Garey and D. S. Johnson, "Computers and Intractability : a guide to NP-Completeness", W. H. Freeman ed., N.Y., 1979.
[13]
O. Goldreich, S. Goldwasser, and N. Linial, "Fault- Tolerant Computation in the Full Information Model", 32nd FOCS, pp. 447-457, 1991.
[14]
O. Goldreich, S. Micali and A. Wigderson, "How to Play any Mental Game", 19th STOC, pp. 218-229, 1987.
[15]
S. Goldwasser and L. Levin, "Fair Computation of General Functions in Presence of Immoral Majority", CR YPTO, 1990.
[16]
F.J. Macwiliams and N. J. A. Sloane, "The Theory of Error Correcting Codes", North-Holland, 1977.
[17]
S. Micali and P. Rogaway, "Secure Computation", in preparation.
[18]
S. Micali and V. Vazirani, "An O(v/#VI.IE})Algorithm for Finding Maximum Matching in General Graphs", 21at FOGS, 1980.
[19]
A. Shamir, "How to share a secret", CACM, Vol. 22, No. 11, pp. 612-613, 1979.

Cited By

View all
  • (2024)Sweeper: Breaking the Validity-Latency Tradeoff in Asynchronous Common SubsetIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.338260219(4534-4546)Online publication date: 2024
  • (2024)H²CT: Asynchronous Distributed Key Generation With High-Computational Efficiency and Threshold Security in Blockchain NetworkIEEE Internet of Things Journal10.1109/JIOT.2024.343155411:20(33758-33772)Online publication date: 15-Oct-2024
  • (2024)ZLB: A Blockchain to Tolerate Colluding Majorities2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN58291.2024.00032(209-222)Online publication date: 24-Jun-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC '93: Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing
June 1993
812 pages
ISBN:0897915917
DOI:10.1145/167088
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 1993

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

STOC93
Sponsor:
STOC93: 25th Annual ACM Symposium on the Theory of Computing
May 16 - 18, 1993
California, San Diego, USA

Acceptance Rates

Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)356
  • Downloads (Last 6 weeks)41
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Sweeper: Breaking the Validity-Latency Tradeoff in Asynchronous Common SubsetIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.338260219(4534-4546)Online publication date: 2024
  • (2024)H²CT: Asynchronous Distributed Key Generation With High-Computational Efficiency and Threshold Security in Blockchain NetworkIEEE Internet of Things Journal10.1109/JIOT.2024.343155411:20(33758-33772)Online publication date: 15-Oct-2024
  • (2024)ZLB: A Blockchain to Tolerate Colluding Majorities2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN58291.2024.00032(209-222)Online publication date: 24-Jun-2024
  • (2024)Almost-Surely Terminating Asynchronous Byzantine Agreement Against General Adversaries with Optimal ResilienceTheoretical Computer Science10.1016/j.tcs.2024.114492(114492)Online publication date: Mar-2024
  • (2024)Lightweight Asynchronous Verifiable Secret Sharing with Optimal ResilienceJournal of Cryptology10.1007/s00145-024-09505-637:3Online publication date: 6-Jun-2024
  • (2024)Enhancing Permissioned Blockchains with Controlled Data AuthorizationInformation Security and Privacy10.1007/978-981-97-5101-3_1(3-23)Online publication date: 15-Jul-2024
  • (2024)Towards Achieving Asynchronous MPC with Linear Communication and Optimal ResilienceAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68397-8_6(170-206)Online publication date: 16-Aug-2024
  • (2024)Linear-Communication Asynchronous Complete Secret Sharing with Optimal ResilienceAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68397-8_13(418-453)Online publication date: 16-Aug-2024
  • (2024)SPRINT: High-Throughput Robust Distributed Schnorr SignaturesAdvances in Cryptology – EUROCRYPT 202410.1007/978-3-031-58740-5_3(62-91)Online publication date: 26-May-2024
  • (2024)Perfect Asynchronous MPC with Linear Communication OverheadAdvances in Cryptology – EUROCRYPT 202410.1007/978-3-031-58740-5_10(280-309)Online publication date: 29-Apr-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media