How to simulate it–a tutorial on the simulation proof technique
Y Lindell - Tutorials on the Foundations of Cryptography …, 2017 - Springer
One of the most fundamental notions of cryptography is that of simulation. It stands behind
the concepts of semantic security, zero knowledge, and security for multiparty computation …
the concepts of semantic security, zero knowledge, and security for multiparty computation …
Hawk: The blockchain model of cryptography and privacy-preserving smart contracts
Emerging smart contract systems over decentralized cryptocurrencies allow mutually
distrustful parties to transact safely without trusted third parties. In the event of contractual …
distrustful parties to transact safely without trusted third parties. In the event of contractual …
[BOOK][B] Foundations of cryptography: volume 2, basic applications
O Goldreich - 2001 - books.google.com
Cryptography is concerned with the conceptualization, definition, and construction of
computing systems that address security concerns. The design of cryptographic systems …
computing systems that address security concerns. The design of cryptographic systems …
How to generate and exchange secrets
ACC Yao - 27th annual symposium on foundations of computer …, 1986 - ieeexplore.ieee.org
In this paper we introduce a new tool for controlling the knowledge transfer process in
cryptographic protocol design. It is applied to solve a general class of problems which …
cryptographic protocol design. It is applied to solve a general class of problems which …
A pragmatic introduction to secure multi-party computation
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …
to a tool for building real systems today. Over the past decade, MPC has been one of the …
Secure multiparty computation
Y Lindell - Communications of the ACM, 2020 - dl.acm.org
Secure multiparty computation Page 1 86 COMMUNICATIONS OF THE ACM | JANUARY 2021 |
VOL. 64 | NO. 1 review articles DISTRIBUTED COMPUTING CONSIDERS the scenario where a …
VOL. 64 | NO. 1 review articles DISTRIBUTED COMPUTING CONSIDERS the scenario where a …
[PDF][PDF] Secure multi-party computation
O Goldreich - Manuscript. Preliminary version, 1998 - Citeseer
More than ten years have elapsed since the rst completeness theorems for two-party and
multi-party fault-tolerant computation have been announced (by Yao and Goldreich, Micali …
multi-party fault-tolerant computation have been announced (by Yao and Goldreich, Micali …
A survey of oblivious transfer protocol
Oblivious transfer (OT) protocol is an essential tool in cryptography that provides a wide
range of applications such as secure multi-party computation, private information retrieval …
range of applications such as secure multi-party computation, private information retrieval …
Secure multiparty computation for privacy preserving data mining
Y Lindell - Encyclopedia of Data Warehousing and Mining, 2005 - igi-global.com
The increasing use of data-mining tools in both the public and private sectors raises
concerns regarding the potentially sensitive nature of much of the data being mined. The …
concerns regarding the potentially sensitive nature of much of the data being mined. The …
Secure multiparty computations on bitcoin
Is it possible to design an online protocol for playing a lottery, in a completely decentralized
way, that is, without relying on a trusted third party? Or can one construct a fully …
way, that is, without relying on a trusted third party? Or can one construct a fully …