One-Round Secure Computation and Secure Autonomous Mobile Agents
- 1 January 2000
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 512-523
- https://doi.org/10.1007/3-540-45022-x_43
Abstract
No abstract availableKeywords
This publication has 18 references indexed in Scilit:
- Non-Interactive Oblivious Transfer and ApplicationsPublished by Springer Science and Business Media LLC ,2001
- Security and Composition of Multiparty Cryptographic ProtocolsJournal of Cryptology, 2000
- Multiple NonInteractive Zero Knowledge Proofs Under General AssumptionsSIAM Journal on Computing, 1999
- A minimal model for secure computation (extended abstract)Published by Association for Computing Machinery (ACM) ,1994
- Secure circuit evaluationJournal of Cryptology, 1990
- On hiding information from an oracleJournal of Computer and System Sciences, 1989
- Completeness theorems for non-cryptographic fault-tolerant distributed computationPublished by Association for Computing Machinery (ACM) ,1988
- Advances in Cryptology — EUROCRYPT ’87Published by Springer Science and Business Media LLC ,1988
- Information theoretic reductions among disclosure problemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1986
- How to construct random functionsJournal of the ACM, 1986