Multiparty Computation with Faulty Majority
- 6 July 2001
- book chapter
- Published by Springer Nature
- p. 589-590
- https://doi.org/10.1007/0-387-34805-0_51
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- Founding crytpography on oblivious transferPublished by Association for Computing Machinery (ACM) ,1988
- Multiparty unconditionally secure protocolsPublished by Association for Computing Machinery (ACM) ,1988
- Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model (Extended Abstract)Lecture Notes in Computer Science, 1988
- Completeness theorems for non-cryptographic fault-tolerant distributed computationPublished by Association for Computing Machinery (ACM) ,1988
- How to play ANY mental gamePublished by Association for Computing Machinery (ACM) ,1987
- How to generate and exchange secretsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1986
- How to simultaneously exchange a secret bit by flipping a symmetrically-biased coinPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1983
- How to share a secretCommunications of the ACM, 1979