{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:17:57Z","timestamp":1753600677739,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540414520"},{"type":"electronic","value":"9783540444954"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44495-5_11","type":"book-chapter","created":{"date-parts":[[2007,10,28]],"date-time":"2007-10-28T05:24:06Z","timestamp":1193549046000},"page":"117-129","source":"Crossref","is-referenced-by-count":20,"title":["Efficient Asynchronous Secure Multiparty Distributed Computation"],"prefix":"10.1007","author":[{"given":"K.","family":"Srinathan","sequence":"first","affiliation":[]},{"given":"C.","family":"Pandu Rangan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,4,26]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Judit Bar-Ilan and Donald Beaver. Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction. In Proceedings of 8th ACM PODC, pages 201\u2013210, August 1989. 118","key":"11_CR1","DOI":"10.1145\/72981.72995"},{"doi-asserted-by":"crossref","unstructured":"Donald Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology, pages 75\u2013122, 1991. 117","key":"11_CR2","DOI":"10.1007\/BF00196771"},{"doi-asserted-by":"crossref","unstructured":"Donald Beaver, Joan Feigenbaum, Joe Kilian, and Phillip Rogaway. Security with low communication overhead (extended abstract). In CRYPTO\u2019 90, pages 62\u201376, 1990. 118","key":"11_CR3","DOI":"10.1007\/3-540-38424-3_5"},{"doi-asserted-by":"crossref","unstructured":"Donald Beaver, Silvio Micali, and Phillip Rogaway. The round complexity of secure protocols(extended abstract). In Proceedings of 22nd ACM STOC, pages 503\u2013513, 1990. 118","key":"11_CR4","DOI":"10.1145\/100216.100287"},{"unstructured":"M. Ben-Or, R. Canetti, and O. Goldreich. Asynchronous secure computations. In Proceedings of 25th ACM STOC, pages 52\u201361, 1993. 117, 117, 118, 118, 118, 118, 118, 120, 121, 121, 121, 122, 122, 126, 126, 129","key":"11_CR5"},{"doi-asserted-by":"crossref","unstructured":"M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic fault-tolerant distributed computation. In Proceedings of 20th ACM STOC, pages 1\u201310, 1988. 117, 120","key":"11_CR6","DOI":"10.1145\/62212.62213"},{"doi-asserted-by":"crossref","unstructured":"M. Ben-Or, B. Kelmer, and T. Rabin. Asynchronous secure computation with optimal resilience. In Proceedings of 13th ACM PODC, pages 183\u2013192, 1994. 117, 118, 118, 120, 121, 121","key":"11_CR7","DOI":"10.1145\/197917.198088"},{"doi-asserted-by":"crossref","unstructured":"G. Bracha. An asynchronous \u230a(n-1)\/3\u230b-resilient consensus protocol. In Proceedings of 3rd ACM PODC, pages 154\u2013162, 1984. 119","key":"11_CR8","DOI":"10.1145\/800222.806743"},{"unstructured":"R. Canetti. Studies in Secure Multiparty Computation and Applications. PhD thesis, The Weizmann Institute of Science, June 1995. 118","key":"11_CR9"},{"doi-asserted-by":"crossref","unstructured":"R. Canetti, U. Feige, O. Goldreich, and M. Naor. Adaptively secure computation. In Proceedings of 28th ACM STOC, 1996. 117","key":"11_CR10","DOI":"10.1145\/237814.238015"},{"doi-asserted-by":"crossref","unstructured":"D. Chaum, C. Crepeau, and I. Damgard. Multiparty unconditionally secure protocols. In Proceedings of 20th ACM STOC, pages 11\u201319, 1988. 117","key":"11_CR11","DOI":"10.1145\/62212.62214"},{"doi-asserted-by":"crossref","unstructured":"R. Cramer, I. Damgard, and U. Maurer. Efficient general secure multiparty computation from any linear secret sharing scheme. In EUROCRYPT2000. Springer-Verlag, 2000. 121, 122","key":"11_CR12","DOI":"10.1007\/3-540-45539-6_22"},{"doi-asserted-by":"crossref","unstructured":"Ronald Cramer, Ivan Damgard, Stefan Dziembowski, Martin Hirt, and Tal Rabin. Efficient multiparty computations secure against an adaptive adversary. In EUROCRYPT\u2019 99. Springer-Verlag, 1999. 117","key":"11_CR13","DOI":"10.1007\/3-540-48910-X_22"},{"doi-asserted-by":"crossref","unstructured":"Matthew K. Franklin and Moti Yung. Communication complexity of secure computation. In Proceedings of 24th ACM STOC, pages 699\u2013710, 1992. 118","key":"11_CR14","DOI":"10.1145\/129712.129780"},{"doi-asserted-by":"crossref","unstructured":"Rosario Gennaro, Micheal O. Rabin, and Tal Rabin. Simplified VSS and fasttrack multiparty computations with applications to threshold cryptography. In Proceedings of 17th ACM PODC, 1998. 118, 123, 124","key":"11_CR15","DOI":"10.1145\/277697.277716"},{"doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In 19th ACM STOC, pages 218\u2013229. ACM Press, 1987. 117","key":"11_CR16","DOI":"10.1145\/28395.28420"},{"doi-asserted-by":"crossref","unstructured":"Martin Hirt, Ueli Maurer, and Bartosz Przydatek. Efficient multi-party computation. In ASIACRYPT 2000. Springer-Verlag, December 2000. 118, 118, 119, 120","key":"11_CR17","DOI":"10.1007\/3-540-44448-3_12"},{"doi-asserted-by":"crossref","unstructured":"T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In Proceedings of 21st ACM STOC, pages 73\u201385, 1989. 117","key":"11_CR18","DOI":"10.1145\/73007.73014"},{"key":"11_CR19","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir. How to share a secret. CACM, 22:612\u2013613, 1979. 120","journal-title":"CACM"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2014INDOCRYPT 2000"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44495-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T23:47:35Z","timestamp":1737503255000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44495-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414520","9783540444954"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-44495-5_11","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}