Protocols for secure computations

作者: Andrew C Yao , None

DOI: 10.1109/SFCS.1982.38

关键词:

摘要: … view of secure computation in the … protocol, any cheating will be discovered if there is a verification stage afterwards where both parties are required to reveal all their private computation…

参考文章(3)
Andrew Chi-Chih Yao, Some complexity questions related to distributive computing(Preliminary Report) symposium on the theory of computing. pp. 209- 213 ,(1979) , 10.1145/800135.804414
Shafi Goldwasser, Silvio Micali, Probabilistic encryption & how to play mental poker keeping secret all partial information Proceedings of the fourteenth annual ACM symposium on Theory of computing - STOC '82. pp. 365- 377 ,(1982) , 10.1145/800070.802212
Whitfield Diffie, Martin E Hellman, None, New Directions in Cryptography IEEE Transactions on Information Theory. ,vol. 22, pp. 644- 654 ,(1976) , 10.1109/TIT.1976.1055638