Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority

144Citations
Citations of this article
48Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

A multiparty protocol to compute a function f(x1, ..., xn) operates as follows: each of n processors holds an input xi, and jointly they must compute and reveal f(x1, ..., xn) without revealing any additional information about the inputs. The processors are connected by secure communication lines but some number of processors may be corrupted by a resource-unbounded adversary that may attempt to interfere with the protocol or to gain extra information. Ben-Or, Goldwasser, Wigderson, Chaum, Crépeau, and Damgård have given protocols tolerating faults in t

Cite

CITATION STYLE

APA

Beaver, D. (1991). Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology, 4(2), 75–122. https://doi.org/10.1007/BF00196771

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free