Abstract
The general area of secure distributed computing and the interplay between distributed computing and security/ cryptography research is reviewed. Recent theoretical and practical developments are discussed.
Preview
Unable to display preview. Download preview PDF.
References
M. Abadi, J. Feigenbaum, and J. Kilian, “On hiding information from an oracle,” J. Comput. System Sci. 39 (1989), 21–50.
M. Abadi and J. Feigenbaum, “Secure circuit evaluation: a protocol based on hiding information from an oracle,” J. Cryptology 2 (1990), 1–12.
L. Adleman Abstract Theory of Computer Viruses CRYPTO 88.
L. Babai and S. Moran, “Arthur-Merlin games: A randomized proof system and a hierarchy of complexity classes,” J. Comput. System Sci. 36 (1988), 254–276.
I. Barany and Z. Furedi, “Mental poker with three or more players,” Information and Control 59 (1983), 84–93.
J. Bar-Ilan and D. Beaver, “Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction,” PODC 1989, 201–209.
R. Bar-Yehuda, B. Chor, and E. Kushilevitz, “Privacy, additional information, and communication,” IEEE Structure in Complexity Theory 1990, 55–65.
D. Beaver, “Multiparty protocols tolerating half faulty processors,” in Crypto 89.
D. Beaver, “Perfect privacy for two-party protocols,” DIMACS Workshop on Distributed Computing and Cryptography, Feigenbaum and Merritt (eds.), AMS, 1990, 65–77.
D. Beaver, “Foundations of secure interactive computing,” in Crypto 91.
D. Beaver, “Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority,” J. Cryptology (1991) 4: 75–122.
D. Beaver and J. Feigenbaum, “Hiding instances in multioracle queries,” STACS 1990, 37–48.
D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway, “Security with low communication overhead,” Crypto 90.
D. Beaver and S. Goldwasser, “Multiparty computation with faulty majority,” IEEE FOCS 1989, 468–473.
D. Beaver, S. Micali, and P. Rogaway, “The round complexity of secure protocols,” ACM STOC 1990, 503–513.
M. Bellare, L. Cowen, and S. Goldwasser, “On the structure of secret key exchange protocols,” DIMACS Workshop on Distributed Computing and Cryptography, Feigenbaum and Merritt (eds.), AMS, 1990, 79–92.
M. Bellare, P. Rogaway, “Entity authentication and key distribution”, Crypto 93.
S.M.Bellovin, M.Merritt, “Limitations of the Kerberos authentication system”, ACM Computer Communication Review 20 5 (Oct.90) 119–132.
J. Benaloh (Cohen), “Secret sharing homomorphisms: keeping shares of a secret secret,” Crypto 86.
J. Benaloh and D. Tuinstra, “Receipt-Free Secret-Ballot Election” ACM STOC 1994, 544–553.
J. Benaloh (Cohen) and M. Yung, “Distributing the power of a government to enhance to privacy of voters,” PODC 1986, 52–62.
M. Ben-Or, R. Canetti, and O. Goldreich, “Asynchronous secure computation,” ACM STOC 1993, 52–61.
M. Ben-Or, B. Kelmer, and T. Rabin, “Asynchronous secure computation with optimal resilience,” ACM PODC 94.
M. Ben-Or and R. Cleve, “Computing algebraic formulas using a constant number of registers,” ACM STOC 1988, 254–257.
M. Ben-Or, O. Goldreich, S. Micali, and R. Rivest, “A fair protocol for signing contracts”, ICALP 1985, Springer-Verlag LNCS 194, 43–52.
M. Ben-Or, S. Goldwasser, and A. Wigderson, “Completeness theorems for noncryptographic fault-tolerant distributed computation,” ACM STOC 1988, 1–9.
R. Berger, R. Peralta, and T. Tedrick, “A provably secure oblivious transfer protocol,” Eurocrypt 1984, 379–386.
E. Berlekamp, Algebraic Coding Theory, Aegean Park Press, Laguna Hills, CA, 1984.
D. Bienstock and P. Seymour, “Monotonicity in graph searching,” J. Algorithms 12 (1991), 230–245.
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, M. Yung, “Systematic design of two-party authentication protocols,” Crypto 91.
M. Blom, “An optimal class of key generation systems”, Eurocrypt 84, LNCS 209, Springer Verlag, 1984, 335–338.
M. Blum, “Three applications of the Oblivious Transfer: University of California, Berkeley, CA, 1981.
M. Blum, “Coin flipping by telephone: a protocol for solving impossible problems,” IEEE Computer Conference 1982, 133–137.
M. Blum, “How to exchange (secret) keys,” ACM Trans. Comput. Sys. 1 (1983), 175–193.
M. Blum, “How to prove a theorem so no one else can claim it,” Proc. of the International Congress of Mathematicians, Berkeley, CA, 1986, 1444–1451.
M. Blum and S. Micali, “How to generate cryptographically strong sequences of pseudo random bits”, SIAM J. Comput. 13 (1984), 850–864.
M. Blum, U. Vazirani, and V. Vazirani, “Reducibility among protocols,” Crypto 83. Plenum Press, 1984.
C. Blundo, A. DeSantis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, “Perfectly-secure key distribution for dynamic conferences” Crypto 92.
S. Brands, “Electronic cash systems based on the representation problem in groups of prime order,” Crypto 93.
G. Brassard, D. Chaum, and C. Crépeau, “Minimum disclosure proofs of knowledge,” J. Comput. System Sci. 37 (1988).
G. Brassard, C. Crépeau, and J. Robert, “Information theoretic reductions among disclosure problems,” IEEE FOCS 1986, 168–173.
G. Brassard, C. Crépeau, and M. Yung, “Perfectly concealing computationally convincing interactive proofs in constant rounds,” Theoretical Computer Science.
R. Breisch, “An intuitive approach to speleo-topology,” Southwestern Cavers (published by the Southwestern Region of the National Speleological Society) 6 (1967), 72–78.
M. Burrows, M. Abadi, and R. Needham, “Authentication: A practical study in belief and action,” in Proc. Second Conference on Theoretical Aspects of Reasoning about Knowledge, Moshe Vardi (ed.), Morgan Kaufmann, 1988.
R. Canetti, and A. Herzberg, “Maintaining Security in the Presence of Transient Faults”, Crypto 94.
R. Canetti, and T. Rabin, “Fast Asynchronous Byzantine Agreement” ACM STOC 1993, 42–52.
R. M. Capocelli, A. De Santis, L. Gargano, abd U. Vaccaro, “On the Size of Shares for Secret Sharing Schemes”, J. of Cryptology, V. 6, N. 3, 157–169.
D. Chaum, “Untraceable electronic mail, return addresses and digital pseudonyms,” CACM 24 (1981), 84–88.
D. Chaum, “Security without identification: transaction systems to make big brother obsolete,” CACM 28, 10 (October 1985).
D. Chaum, “The spymasters double-agent problem: multiparty computations secure unconditionally from minorities and cryptographically from majorities,” Crypto 89.
D. Chaum, C. Crépeau, and I. Damgård, “Multiparty unconditionally secure protocols,” ACM STOC 1988, 11–19.
D. Chaum, I. Damgård, and J. van de Graaf, “Multiparty computations ensuring privacy of each party's input and correctness of the result,” Crypto 87.
D. Chaum, A. Fiat, and M. Naor, “Untraceable electronic cash,” Crypto 88.
D. Chaum and T. Pederson, “Wallet databases with observers,” Crypto 92.
B. Chor, M. Gereb-Graus, and E. Kushilevitz, “Private computations over the integers,” IEEE FOCS 1990, 335–344.
B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch, “Verifiable secret sharing and achieving simultaneity in the presence of faults,” IEEE FOCS 1985, 383–395.
B. Chor and E. Kushilevitz, “A zero-one law for boolean privacy,” ACM STOC 1989, 62–72.
R. Cleve, “Limits on the security of coin flips when half the processors are faulty,” ACM STOC 1986, 364–369.
R. Cleve, “Controlled gradual disclosure schemes for random bits and their applications,” Crypto 89.
J. (Benaloh) Cohen and M. Fisher, “A robust and verifiable cryptographically secure election scheme,” IEEE FOCS 1985, 372–382.
G.R. Blakley, “Safeguarding Cryptographic Keys” AFIPS Conf. Proc. v. 48, 1979, 313–317.
F. Cohen, Computer Viruses, Ph.D. dissertation, UCS, 1986.
D. Coppersmith, “Cheating at mental poker,” Crypto 85.
C. Crépeau, “A secure poker protocol that minimizes the effect of player coalitions,” Crypto 85.
C. Crépeau, “A zero-knowledge poker protocol that achieves confidentiality of the players' strategy, or How to achieve an electronic poker face,” Crypto 86.
C. Crépeau, “Equivalence between two flavours of Oblivious Transfer,” Crypto 88.
C. Crépeau and J. Kilian, “Achieving oblivious transfer using weakened security assumptions,” IEEE FOCS 1988, 42–52.
A. DeSantis, Y. Desmedt, Y. Frankel, and M. Yung, “How to Share a Function Securely”, ACM STOC 1994, 522–533.
W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, 22(6): 644–654, 1976.
W. Diffie, P. Van Oorschot, M. Weiner, “Authentication and Authenticated Key Exchange” Designs, Codes and Cryptography, 2, 1992, 107–125.
E. W. Dijkstra, Self-Stabilizing Systems in spite of Distributed Control, CACM, 17, 1974, pp. 643–644.
D. Dolev, C. Dwork, O. Waarts, and M. Yung, “Perfectly secure message transmission,” JACM 40 (1993), 17–47.
D. Dolev and A. Yao, “On the security of public key protocols,” ACM FOCS 1981, 350–357.
S. Even, O. Goldreich, and A. Lempel, “A randomized protocol for signing contracts,” CACM 28 (1985), 637–647.
S. Even, O. Goldreich, and Y. Yacobi, “Electronic Wallet,” Crypto 83.
U. Feige, A. Fiat, and A. Shamir, “Zero-Knowledge Proofs of Identity,” J. Cryptology 1 (1988) 77–94.
U. Feige, J. Kilian, and M. Naor, “A Minimal Model for Secure Computation”, ACM STOC 1994, 554–563.
P. Feldman and S. Micali, “Optimal algorithms for Byzantine agreement,” ACM STOC 1988, 148–161.
N. Ferguson, “Extensions of single-term coins,” Crypto 93.
A. Fiat and A. Shamir, “How to prove yourself: Practical solutions to identification and signature problems,” Crypto86.
S. Fortune and M. Merritt, “Poker protocols,” Crypto 84.
M. Franklin, “Complexity and security of distributed protocols”, Ph.D. thesis, Columbia University, 1993.
M. Franklin, Z. Galil, and M. Yung, “Eavesdropping games: A graph-theoretic approach to privacy in distributed systems,” IEEE FOCS 1993, 670–679.
M. Franklin and M. Yung, “Communication complexity of secure computation,” ACM STOC 1992, 699–710.
M. Franklin and M. Yung, “Secure and efficient off-line digital money,” ICALP 93.
M. Franklin and M. Yung, “Privacy from Partial Broadcast”, Technical Report, CWI, Amsterdam.
Z. Galil, S. Haber, and M. Yung, “Cryptographic computation: secure fault-tolerant protocols and the public-key model,” Crypto 87.
J.A. Garay, Reaching (and maintaining) agreement in the presence of mobile faults”. WDAG 94.
O. Goldreich, S. Micali, and A. Wigderson, “Proofs that yield nothing but their validity and a methodology of cryptographic protocol design,” IEEE FOCS 1986, 174–187.
O. Goldreich, S. Micali, and A. Wigderson, “How to play any mental game,” ACM STOC 1987, 218–229.
O. Goldreich and R. Vainish, “How to solve any protocol problem — an efficiency improvement,” Crypto 87.
S. Goldwasser and L. Levin, “Fair computation of general functions in presence of immoral majority,” Crypto 89.
S. Goldwasser and S. Micali, “Probabilistic encryption,” J. Comput. System Sci. 28 (1984), 270–299. (STOC 82).
S. Goldwasser, S. Micali, and C. Rackoff, “The knowledge complexity of interactive proof systems,” SIAM J. Comput. 18 (1989), 186–208.
S. Haber, “Multiparty cryptographic computation: techniques and applications,” Ph.D. thesis, Columbia University, 1988.
J.T. Hastad, “Pseudo-random generators under uniform assumptions,” STOC 1990, 395–404.
J. Håstad and A. Shamir, “The cryptographic security of truncated linearly related variables,” STOC 1985, 356–362.
A. Herzberg, P. Janson, S. Kutten, R. Molva, G. Tsudik and M. Yung, KryptoKnight: Light-Weight Authentication and Key Distribution.
M. Huang and S. Teng, “Security, verifiability, and universality in distributed computing,” J. Algorithms 11 (1990), 492–521.
R. Impagliazzo, L. Levin, and M. Luby, “Pseudorandom number generation from one-way functions,” ACM STOC 1989, 12–24.
R. Impagliazzo and M. Luby, “One-way functions are essential for complexity based cryptography,” IEEE FOCS 1989, 230–235.
R. Impagliazzo and S. Rudich, “Limits on the provable consequences of one-way permutations,” ACM STOC 1989, 44–61.
R. Impagliazzo, and M. Yung, “Direct minimum-knowledge computation,” Crypto 87.
“Banking — Key management (wholesale)” ISO 8732, Geneva (1988).
“OSI Directory — Part 8: Authentication Framework”, ISO 9594-8, Geneva (1988).
J. Kephart and S. White, Directed-Graph Epidemiological Models of Computer Viruses, IEEE Sym. on Security and Privacy, 1991.
J. Kilian, “Founding cryptography on oblivious transfer,” ACM STOC 1988, 20–31.
J. Kilian, “Uses of Randomness in Algorithms and Protocols,” ACM Distinguished Dissertation, MIT Press, 1990.
J. Kilian, “A general completeness theorem for two-party games,” ACM STOC 1991, 553–560.
L. Kirousis and C. Papadimitriou, “Interval graphs and searching,” Discrete Mathematics 55 (1985) 181–184.
L. Kirousis and C. Papadimitriou, “Searching and pebbling,” Theoretical Computer Science 47 (1986), 205–218.
H. Krawczyk, “Distributed Fingerprints and Secure Information Disperal” ACM PODC 1993, 207–218.
E. Kushilevitz, “Privacy and communication complexity,” IEEE FOCS 1989, 416–421.
E. Kushilevitz, S. Micali, and R. Ostrovsky, “Reducibilities and completeness in multi-party private communication”, FOCS 94.
E. Kushilevitz and A. Rosén, “A randomness-rounds tradeoff in private computation” Crypto 94.
L. Lamport, R. Shostak, and M. Pease, “The Byzantine generals problem,” ACM Trans. on Programming Lang. and Systems (1982), 382–401.
A. LaPaugh, “Recontamination does not help to search a graph,” JACM, April 1993 (originally Princeton Technical Report 335).
R. Lipton, “How to cheat at mental poker,” proceedings of AMS short course on cryptography, 1981.
M. Luby, S. Micali, and C. Rackoff, “How to simultaneously exchange a secret bit by flipping a symmetrically-biased coin,” IEEE FOCS 1984, 11–21.
N. Megiddo, S. Hakimi, M. Garey, D. Johnson, and C. Papadimitriou, “The complexity of searching a graph,” JACM 35 (1988), 18–44.
M. Merritt, “Cryptographic protocols,” Ph.D. thesis, Georgia Institute of Technology, 1983.
S. Micali and P. Rogaway, “Secure computation,” Crypto 91.
M. Naor, “Bit commitment using pseudo-randomness,” Crypto 89.
M. Naor, R. Ostrovsky, R. Venkatesan, and M. Yung, “Perfect zero-knowledge arguments for NP can be based on general complexity assumptions,” Crypto 92.
M. Naor and M. Yung, “Universal one-way hash functions and their cryptographic applications,” STOC 1989, 33–43.
R. M. Needham, M. D. Schroeder, “Using encryption for authentication in large networks of computers,” CACM 21 12 (1978) 993–998.
T. Okamoto and K. Ohta, “Universal electronic cash,” Crypto 91.
A. Orlitsky and A. El Gamal, “Communication with secrecy constraints,” ACM STOC 1984, 217–224.
R. Ostrovsky, R. Venkatesan, and M. Yung, “Fair games against an all-powerful adversary,” Sequences Workshop, Positano, Italy, July 1991.
R. Ostrovsky and M. Yung, “On necessary conditions for secure distributed computing,” DIMACS Workshop on Distributed Computing and Cryptography, Feigenbaum and Merritt (eds.), AMS, 1990, 229–234.
R. Ostrovsky and M. Yung, “Robust computation in the presence of mobile viruses,” ACM PODC 1991, 51–59.
T. Parsons, “Pursuit-evasion in a graph,” in “Theory and application of graphs,” (Y. Alavi and D. Lick, eds.), Springer-Verlag (1976), 426–441.
M. Rabin, “Digital signatures,” in Foundations of Secure Computation, R. DeMillo, D. Dobkin, A. Jones, and R. Lipton (editors), Academic Press, NY, 1978, 155–168.
M. Rabin, “How to exchange secrets by oblivious transfer,” Tech. Memo TR-81, Aiken Computation Laboratory, Harvard University, 1981.
M. Rabin, “Transaction Protection by Beacon” J. Comp. Sys. Sci. 27, 2, 1983, 256–267.
T. Rabin, “Robust sharing of secrets when the dealer is honest or cheating,” M.Sc. Thesis, Hebrew University, 1988.
T. Rabin and M. Ben-Or, “Verifiable secret sharing and multiparty protocols with honest majority,” ACM STOC 1989, 73–85.
R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems,” CACM 21 (1978), 120–126.
J. Rompel, “One-way functions are necessary and sufficient for secure signatures,” STOC 1990, 387–394.
A. Shamir, “How to share a secret,” CACM 22 (1979), 612–613.
A. Shamir, R. Rivest, and L. Adleman, “Mental poker,” Technical Report MIT/LCS/TR-125, M.I.T., 1979.
G. Steiner, C. Neuman, J. I. Schiller, “Kerberos: an authentication server for open network systems”, Proc. Usenix Conf. (Winter 88).
M. Tompa and H. Woll, “Random self-reducibility and zero knowledge interactive proofs of possession of information,” IEEE FOCS 1987, 472–482.
U. Vazirani and V. Vazirani, “Trapdoor pseudo-random number generators, with applications to protocol design,” IEEE FOCS 1983, 23–30.
A. Yao, “Some complexity questions related to distributive computing,” ACM STOC 1979, 209–213.
A. Yao, “Protocols for secure computations,” IEEE FOCS 1982, 160–164.
A. Yao, “How to generate and exchange secrets,” IEEE FOCS 1986, 162–167.
M. Yung, “Cryptoprotocols: subscription to a public key, the secret blocking and the multi-player mental poker game,” Crypto 84.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1994 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yung, M. (1994). Secure distributed computing: Theory and practice. In: Tel, G., Vitányi, P. (eds) Distributed Algorithms. WDAG 1994. Lecture Notes in Computer Science, vol 857. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0020424
Download citation
DOI: https://doi.org/10.1007/BFb0020424
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-58449-0
Online ISBN: 978-3-540-48799-9
eBook Packages: Springer Book Archive