skip to main content
research-article

How to play any mental game, or a completeness theorem for protocols with honest majority

Published:04 October 2019Publication History
First page image

References

  1. [Ba] D. Barrington, Bounded-Width Branching Programs Recognize Exactly Those Languages in NC1, Proc. 18th STOC, 1986 pp 1--5Google ScholarGoogle Scholar
  2. [B1] M. Blum, Coin Flipping by Telephone, IEEE COMPCON 1982, pp. 133--137.Google ScholarGoogle Scholar
  3. [BH] R. Boppana and R. Hirschfeld, Pseudo-Random Generatora and Complexity Classes, To appear in Randomness and Computation, 5th volume of Advances in Computing Research, ed. S. MicaliGoogle ScholarGoogle Scholar
  4. [BM] M. Blum and S. Micali, How To Generate Sequences Of Cryptographically Strong Pseudo-Random Bits, SIAM J. on Computing, Vol. 13, Nov 1984, pp. 850--864Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [CG] B. Chor and O. Goldreich, RSA/Rabin Bits Are 1/2 + 1/poly(logN) Secure, To appear SIAM J. on Computing. Earlier version in Proc. FOCS 1984, pp. 449--463Google ScholarGoogle Scholar
  6. [CGMA] B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch, Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults', Proc. 26th FOCS, 1985, pp. 383--395Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [EGL] S. Even, O. Goldreich, and A. Lempel, A Randomized Protocol for Signing Contracts, CACM, vol. 28, No. 6, 1985, pp. 637--647Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [FMRW] M. Fischer, S. Micali, C. Rackoff and D. Witenberg, A Secure Protocol for the Oblivious Transfer, In preperation 1986.Google ScholarGoogle Scholar
  9. [GM] S. Goldwasser, and S. Micali, Probabilistic Encryption, JCSS Vol. 28, No. 2, April 1984. An earlier version (containing other results) was titled Probabilistic Encryption and How to Play Mental Poker Hideing Ail Partial Information,Google ScholarGoogle Scholar
  10. [GMR] S. Goldwasser, S. Micali and C. Rackoff, The Knowledge Complexity of Interactive Proof-Systems, To appear SIAM J. on Computing (manuscript available from authors). Earlier version in Proc. 17th Annual ACM Symp. on Theory of Computing, pp 291--304.Google ScholarGoogle Scholar
  11. [GoMiRi] S. Goldwasser, S. Micali, and R. Rivest, A Digital Signature Scheme Secure Against Adaptive, Chosen Cyphertezt Attack To appear in SLAM J. on Computing (available from authors) Earlier version, titled "A Paradoxical Solution to the Signature Problem, in Proc. 25th FOCS, 1984, pp. 441--448Google ScholarGoogle Scholar
  12. [GMW] O. Goldreich, S. Micali and A. Wigderson, Proofs that Yield Nothing but their Validity and a Methodology of Cryptographic Design, Proc. of FOCS 1986.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [HR] J. Halpern and M.O. Rabin, A Logic to reason about likehood, Proc. of 15th STOC, 1983.Google ScholarGoogle Scholar
  14. [L] L. Leonid, One-Way Functions and PseudO-Random Generators, Proc. 17th STOC, 1985, pp. 363--365Google ScholarGoogle Scholar
  15. [Y] A.Yao, Theory and Application of Trapdoor Functions, Proc. of 23rd FOCS, IEEE, Nov., 1982, pp. 80--91.Google ScholarGoogle Scholar
  16. [Y2] A.Yao, How to Generate and Exchange Secrets, Proc. 27th STOC, 1986, pp. 162--167Google ScholarGoogle Scholar

Index Terms

  1. How to play any mental game, or a completeness theorem for protocols with honest majority
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Books
            Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali
            October 2019
            836 pages
            ISBN:9781450372664
            DOI:10.1145/3335741

            Copyright © 2019

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 4 October 2019

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Appears In

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader