[BB89]
J. Bar-Ilan and D. Beaver. Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction. In Proc. 8th ACM Symposium on Principles of Distributed Computing (PODC), pp. 201–210, 1989.
[Bea91a]
D. Beaver. Efficient multiparty protocols using circuit randomization. In
Advances in Cryptology-CRYPTO’ 91, vol. 576 of
LNCS, pp. 420–432, 1991.
CrossRef[Bea91b]
D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology, pp. 75–122, 1991.
[BFKR90]
D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Security with low communication overhead (extended abstract). In Advances in Cryptology-CRYPTO’ 90, pp. 62–76, 1990.
[BGP89]
P. Berman, J. A. Garay, and K. J. Perry. Towards optimal distributed consensus (extended abstract). In Proc. 21st IEEE Symposium on the Foundations of Computer Science (FOCS), pp. 410–415, 1989. Expanded version: Bit optimal distributed consensus. In Computer Science Research, 1992.
[BGW88]
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proc. 20th ACM Symposium on the Theory of Computing (STOC), pp. 1–10, 1988.
[BMR90]
D. Beaver, S. Micali, and P. Rogaway. The round complexity of secure protocols (extended abstract). In Proc. 22nd ACM Symposium on the Theory of Computing (STOC), pp. 503–513, 1990.
[Can00]
R. Canetti. Security and composition of multi-party cryptographic protocols.
Journal of Cryptology, 13(1):143–202, 2000.
MATHCrossRefMathSciNet[CCD88]
D. Chaum, C. Crépeau, and I. Damgård. Multiparty unconditionally secure protocols (extended abstract). In Proc. 20th ACM Symposium on the Theory of Computing (STOC), pp. 11–19, 1988.
[CDD+99]
R. Cramer, I. Damgård, S. Dziembowski, M. Hirt, and T. Rabin. Efficient multiparty computations secure against an adaptive adversary. In Advances in Cryptology-EUROCRYPT’ 99, vol. 1592 of LNCS, pp. 311–326, 1999.
[CDM00]
R. Cramer, I. Damgård, and U. Maurer. General secure multi-party computation from any linear secret sharing scheme. In
Advances in Cryptology-EUROCRYPT’ 00, vol. 1807 of
LNCS, pp. 316–334, 2000.
CrossRef[CDN00]
R. Cramer, I. Damgård, and J. B. Nielsen. Multiparty computation from threshold homomorphic encryption. Manuscript, 2000.
[CH94]
R. Canetti and A. Herzberg. Maintaining security in the presence of transient faults. In Advances in Cryptology-CRYPTO’ 94, vol. 839 of LNCS, pp. 425–438, 1994.
[CKS00]
C. Cachin, K. Kursawe, and V. Shoup. Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography. In Proc. 19th ACM Symposium on Principles of Distributed Computing (PODC), pp. 123–132, 2000.
[CW89]
B. A. Coan and J. L. Welch. Modular construction of nearly optimal Byzantine agreement protocols. In
Proc. 8th ACM Symposium on Principles of Distributed Computing (PODC), pp. 295–305, 1989. Expanded version: Modular construction of a Byzantine agreement protocol with optimal message bit complexity. In
Information and Computation, 97(1):61–85, 1992.
MathSciNet[DFF+82]
D. Dolev, M. J. Fischer, R. Fowler, N. A. Lynch, and H. R. Strong. An efficient algorithm for Byzantine agreement without authentication.
Information and Control, 52(3):257–274, 1982.
MATHCrossRefMathSciNet[DR85]
D. Dolev and R. Reischuk. Bounds on information exchange for Byzantine agreement.
Journal of the ACM, 32(1):191–204, 1985.
MATHCrossRefMathSciNet[DRS82]
D. Dolev, R. Reischuk, and H. R. Strong. ‘Eventual’ is earlier than ‘Immediate’. In Proc. 23rd IEEE Symposium on the Foundations of Computer Science (FOCS), pp. 196–203, 1982. Final version: Early Stopping in Byzantine Agreement. In Journal of the ACM, 37(4):720–741, October 1990.
[FHM98]
M. Fitzi, M. Hirt, and U. Maurer. Trading correctness for privacy in unconditional multi-party computation. In
Advances in Cryptology-CRYPTO’ 98, vol. 1462 of
LNCS, pp. 121–136, 1998.
CrossRef[FM88]
P. Feldman and S. Micali. Optimal algorithms for Byzantine agreement. In
Proc. 20th ACM Symposium on the Theory of Computing (STOC), pp. 148–161, 1988. Expanded version in
SIAM Journal on Computing 26(4):873–933, August 1997.
MathSciNet[FY92]
M. K. Franklin and M. Yung. Communication complexity of secure computation. In Proc. 24th ACM Symposium on the Theory of Computing (STOC), pp. 699–710, 1992.
[GHY87]
Z. Galil, S. Haber, and M. Yung. Cryptographic computation: Secure faulttolerant protocols and the public-key model. In Advances in Cryptology-CRYPTO’ 87, vol. 293 of LNCS, pp. 135–155. Springer-Verlag, 1987.
[GMW87]
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game-a completeness theorem for protocols with honest majority. In Proc. 19th ACM Symposium on the Theory of Computing (STOC), pp. 218–229, 1987.
[GRR98]
R. Gennaro, M. O. Rabin, and T. Rabin. Simplified VSS and fasttrack multiparty computations with applications to threshold cryptography. In Proc. 17th ACM Symposium on Principles of Distributed Computing (PODC), 1998.
[HH91]
V. Hadzilacos and J. Y. Halpern. Message-optimal protocols for byzantine agreement. In Proc. 10th ACM Symposium on Principles of Distributed Computing (PODC), pp. 309–324, 1991. Final version in Mathematical Systems Theory, 26:41-102, October 1993.
[HM00]
M. Hirt and U. Maurer. Player simulation and general adversary structures in perfect multiparty computation.
Journal of Cryptology, 13(1):31–60, 2000. Extended abstract in
Proc. 16th of ACM PODC’ 97.
MATHCrossRefMathSciNet[MR98]
S. Micali and P. Rogaway. Secure computation: The information theoretic case. Manuscript, 1998. Former version: Secure computation, In Advances in Cryptology-CRYPTO’ 91, volume 576 of LNCS, pp. 392–404, Springer-Verlag, 1991.
[OY91]
R. Ostrovsky and M. Yung. How to withstand mobile virus attacks (extended abstract). In Proc. 10th ACM Symposium on Principles of Distributed Computing (PODC), pp. 51–59, 1991.
[Prz99]
B. Przydatek. Efficiency in multi-party computation. Master’s thesis, ETH Zurich, 1999.
[PSL80]
M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults.
Journal of the ACM, 27(2):228–234, 1980.
MATHCrossRefMathSciNet[RB89]
T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In Proc. 21st ACM Symposium on the Theory of Computing (STOC), pp. 73–85, 1989.
[Sha79]
A. Shamir. How to share a secret.
Communications of the ACM, 22:612–613, 1979.
MATHCrossRefMathSciNet[Yao82]
A. C. Yao. Protocols for secure computations. In Proc. 23rd IEEE Symposium on the Foundations of Computer Science (FOCS), pp. 160–164. IEEE, 1982.