Proceedings of the Nineteenth Annual ACM Conference on Theory of Computing - STOC '87 1987
DOI: 10.1145/28395.28420
|View full text |Cite
|
Sign up to set email alerts
|

How to play ANY mental game

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
1,079
0
1

Year Published

1998
1998
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 2,763 publications
(1,081 citation statements)
references
References 10 publications
1
1,079
0
1
Order By: Relevance
“…Both frameworks have composition theorems, and are based on older definitional work. The initial ideal-model based definitional approach for secure function evaluation is informally proposed by Goldreich, Micali, and Wigderson in [22]. The first formalizations appear in Goldwasser and Levin [24], Micali and Rogaway [34], and Beaver [5].…”
Section: Previous Workmentioning
confidence: 99%
“…Both frameworks have composition theorems, and are based on older definitional work. The initial ideal-model based definitional approach for secure function evaluation is informally proposed by Goldreich, Micali, and Wigderson in [22]. The first formalizations appear in Goldwasser and Levin [24], Micali and Rogaway [34], and Beaver [5].…”
Section: Previous Workmentioning
confidence: 99%
“…Oblivious transfer, and consequently ANDOS, can be based on various assumptions like the existence of trapdoor functions [16], of noisy channels [12] or of quantum channels [3]. From a practical point of view, efficient implementation can be based on the quadratic residuosity problem [7,25] or on the Diffie-Hellman assumption [1,23].…”
Section: All-or Nothing Disclosure Of Secrets Protocolsmentioning
confidence: 99%
“…At the moment, let us stress that we do not develop a general two-party computation protocol but just an efficient scheme suitable to the generation of shared RSA keys. Consequently we need weaker notions of privacy and correctness than those described in more general papers [2,8,16,26].…”
Section: Efficient Two-party Evaluation Of Algebraic Expressionsmentioning
confidence: 99%
See 1 more Smart Citation
“…A number of cooperative computation problems have been shown to be plausible, in a secure way, using multi party computational techniques [2,5]. Generic solutions have been developed [3,8] and much effort has been directed towards reducing the communication complexity [7] and round complexity [6] of these solutions.…”
Section: Introductionmentioning
confidence: 99%