How to simulate it–a tutorial on the simulation proof technique

Y Lindell - Tutorials on the Foundations of Cryptography …, 2017 - Springer
One of the most fundamental notions of cryptography is that of simulation. It stands behind
the concepts of semantic security, zero knowledge, and security for multiparty computation …

Hawk: The blockchain model of cryptography and privacy-preserving smart contracts

A Kosba, A Miller, E Shi, Z Wen… - 2016 IEEE symposium …, 2016 - ieeexplore.ieee.org
Emerging smart contract systems over decentralized cryptocurrencies allow mutually
distrustful parties to transact safely without trusted third parties. In the event of contractual …

[BOOK][B] Foundations of cryptography: volume 2, basic applications

O Goldreich - 2001 - books.google.com
Cryptography is concerned with the conceptualization, definition, and construction of
computing systems that address security concerns. The design of cryptographic systems …

How to generate and exchange secrets

ACC Yao - 27th annual symposium on foundations of computer …, 1986 - ieeexplore.ieee.org
In this paper we introduce a new tool for controlling the knowledge transfer process in
cryptographic protocol design. It is applied to solve a general class of problems which …

A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

Secure multiparty computation

Y Lindell - Communications of the ACM, 2020 - dl.acm.org
Secure multiparty computation Page 1 86 COMMUNICATIONS OF THE ACM | JANUARY 2021 |
VOL. 64 | NO. 1 review articles DISTRIBUTED COMPUTING CONSIDERS the scenario where a …

[PDF][PDF] Secure multi-party computation

O Goldreich - Manuscript. Preliminary version, 1998 - Citeseer
More than ten years have elapsed since the rst completeness theorems for two-party and
multi-party fault-tolerant computation have been announced (by Yao and Goldreich, Micali …

A survey of oblivious transfer protocol

VK Yadav, N Andola, S Verma… - ACM Computing Surveys …, 2022 - dl.acm.org
Oblivious transfer (OT) protocol is an essential tool in cryptography that provides a wide
range of applications such as secure multi-party computation, private information retrieval …

Secure multiparty computation for privacy preserving data mining

Y Lindell - Encyclopedia of Data Warehousing and Mining, 2005 - igi-global.com
The increasing use of data-mining tools in both the public and private sectors raises
concerns regarding the potentially sensitive nature of much of the data being mined. The …

Secure multiparty computations on bitcoin

M Andrychowicz, S Dziembowski… - Communications of the …, 2016 - dl.acm.org
Is it possible to design an online protocol for playing a lottery, in a completely decentralized
way, that is, without relying on a trusted third party? Or can one construct a fully …