Skip to main content

Multiparty Computation, an Introduction

  • Chapter
Contemporary Cryptology

Part of the book series: Advanced Courses in Mathematics - CRM Barcelona ((ACMBIRK))

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.95
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. Beaver: Foundations of Secure Interactive Computing, Proc. of Crypto 91.

    Google Scholar 

  2. L. Babai, A. Gál, J. Kollár, L. Rónyai, T. Szabó, A. Wigderson: Extremal Bipartite Graphs and Superpolynomial Lowerbounds for Monotone Span Programs, Proc. ACM STOC’ 96, pp. 603–611.

    Google Scholar 

  3. J. Benaloh, J. Leichter: Generalized Secret Sharing and Monotone Functions, Proc. of Crypto’ 88, Springer Verlag LNCS series, pp. 25–35.

    Google Scholar 

  4. M. Ben-Or, S. Goldwasser, A. Wigderson: Completeness theorems for Non-Cryptographic Fault-Tolerant Distributed Computation, Proc. ACM STOC’ 88, pp. 1–10.

    Google Scholar 

  5. E. F. Brickell: Some Ideal Secret Sharing Schemes, J. Combin. Maths. & Combin. Comp. 9 (1989), pp. 105–113.

    MathSciNet  Google Scholar 

  6. R. Canetti: Studies in Secure Multiparty Computation and Applications, Ph. D. thesis, Weizmann Institute of Science, 1995. (Better version available from Theory of Cryptography Library).

    Google Scholar 

  7. R. Canetti, U. Fiege, O. Goldreich and M. Naor: Adaptively Secure Computation, Proceedings of STOC 1996.

    Google Scholar 

  8. R. Canetti: Universally Composable Security, The Eprint archive, www.iacr.org.

    Google Scholar 

  9. R. Canetti, U. Feige, O. Goldreich, M. Naor: Adaptively Secure Multi-Party Computation, Proc. ACM STOC’ 96, pp. 639–648.

    Google Scholar 

  10. D. Chaum, C. Crépeau, I. Damgård: Multi-Party Unconditionally Secure Protocols, Proc. of ACM STOC’ 88, pp. 11–19.

    Google Scholar 

  11. R. Cramer, I. Damgård: Zero Knowledge for Finite Field Arithmetic or: Can Zero Knowledge be for Free?, Proc. of CRYPTO’98, Springer Verlag LNCS series.

    Google Scholar 

  12. R. Cramer, I. Damgård, S. Dziembowski, M: Hirt and T. Rabin: Efficient Multiparty Computations With Dishonest Minority, Proceedings of EuroCrypt 99, Springer Verlag LNCS series.

    Google Scholar 

  13. R. Cramer, I. Damgård and U. Maurer: Multiparty Computations from Any Linear Secret Sharing Scheme. In: Proc. EUROCRYPT’ 00.

    Google Scholar 

  14. R. Cramer. Introduction to Secure Computation. Latest version: January 2001. Available from http://www.brics.dk/~cramer

    Google Scholar 

  15. C. Crepeau, J. vd.Graaf and A. Tapp: Committed Oblivious Transfer and Private Multiparty Computation, Proc. of Crypto 95, Springer Verlag LNCS series.

    Google Scholar 

  16. D. Dolev, C. Dwork, and M. Naor, Non-malleable cryptography, Proc. ACM STOC’ 91, pp. 542–552.

    Google Scholar 

  17. I. Damgård and J. Nielsen: Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption, Proc. of Crypto 2003, Springer Verlag LNCS.

    Google Scholar 

  18. M. Fitzi, U. Maurer: Efficient Byzantine agreement secure against general adversaries, Proc. Distributed Computing DISC’ 98.

    Google Scholar 

  19. R. Gennaro, M. Rabin, T. Rabin, Simplified VSS and Fast-Track Multiparty Computations with Applications to Threshold Cryptography, in Proc of ACM PODC’98, pp. 101–111.

    Google Scholar 

  20. O. Goldreich, S. Micali and A. Wigderson: How to Play Any Mental Game or a Completeness Theorem for Protocols with Honest Majority, Proc. of ACM STOC’ 87, pp. 218–229.

    Google Scholar 

  21. M. Hirt, U. Maurer: Complete Characterization of Adversaries Tolerable in General Multiparty Computations, Proc. ACM PODC’97, pp. 25–34.

    Google Scholar 

  22. M. Karchmer, A. Wigderson: On Span Programs, Proc. of Structure in Complexity, 1993.

    Google Scholar 

  23. J. Kilian: Founding Cryptography on Oblivious Transfer, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, pages 20–31, Chicago, Illinois, 2–4 May 1988.

    Google Scholar 

  24. S. Micali and P. Rogaway: Secure Computation, Manuscript, Preliminary version in Proceedings of Crypto 91.

    Google Scholar 

  25. Nielsen: Protocol Security in the Cryptographic Model, PhD thesis, Dept. of Comp. Science, Aarhus University, 2003.

    Google Scholar 

  26. T. P. Pedersen: Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Proc. CRYPTO’ 91, Springer Verlag LNCS, vol. 576, pp. 129–140.

    Google Scholar 

  27. P. Pudlák, J. Sgall: Algebraic Models of Computation and Interpolation for Algebraic Proof Systems Proc. Feasible Arithmetic and Proof Complexity, Springer Verlag LNCS series.

    Google Scholar 

  28. T. Rabin: Robust Sharing of Secrets when the Dealer is Honest or Cheating, J. ACM, 41(6):1089–1109, November 1994.

    Article  Google Scholar 

  29. T. Rabin, M. Ben-Or: Verifiable Secret Sharing and Multiparty Protocols with Honest majority, Proc. ACM STOC’ 89, pp. 73–85.

    Google Scholar 

  30. A. Shamir: How to Share a Secret, Communications of the ACM 22 (1979) 612–613.

    Article  MATH  MathSciNet  Google Scholar 

  31. M. van Dijk: Secret Key Sharing and Secret Key Generation, Ph.D. Thesis, Eindhoven University of Technology, 1997.

    Google Scholar 

Download references

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Birkhäuser Verlag

About this chapter

Cite this chapter

Cramer, R., Damgård, I. (2005). Multiparty Computation, an Introduction. In: Contemporary Cryptology. Advanced Courses in Mathematics - CRM Barcelona. Birkhäuser Basel. https://doi.org/10.1007/3-7643-7394-6_2

Download citation

  • DOI: https://doi.org/10.1007/3-7643-7394-6_2

  • Publisher Name: Birkhäuser Basel

  • Print ISBN: 978-3-7643-7294-1

  • Online ISBN: 978-3-7643-7394-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics