-
1
-
-
3042545539
-
1-Out-of-n Signatures from a Variety of Keys
-
M. Abe, M. Ohkubo, and K. Suzuki. 1-out-of-n Signatures from a Variety of Keys. ASIACRYPT'02, 2002, pages 415-432, 2002.
-
(2002)
ASIACRYPT'02
, vol.2002
, pp. 415-432
-
-
Abe, M.1
Ohkubo, M.2
Suzuki, K.3
-
2
-
-
84957360961
-
Oblivious Transfers and Privacy Amplification
-
G. Brassard, C. Crépeau. Oblivious Transfers and Privacy Amplification. EUROCRYPT'97, pages 334-346, 1997.
-
(1997)
EUROCRYPT'97
, pp. 334-346
-
-
Brassard, G.1
Crépeau, C.2
-
3
-
-
84959049489
-
An Efficient and Practical Scheme for Privacy Protection in E-commerce of Digital Goods
-
F. Bao, R. Deng, P. Feng. An Efficient and Practical Scheme for Privacy Protection in E-commerce of Digital Goods. ICICS'03, pages 162-170. 2000.
-
(2000)
ICICS'03
, pp. 162-170
-
-
Bao, F.1
Deng, R.2
Feng, P.3
-
5
-
-
0030283655
-
Oblivious Transfer and Intersecting Codes
-
coding and complexity
-
G. Brassard, C. Crepeau, M. Santha. Oblivious Transfer and Intersecting Codes. IEEE Trans. on Inf. Th., special issue in coding and complexity, Vol. 42, No. 6, pages 1769-1780, 1996.
-
(1996)
IEEE Trans. on Inf. Th.
, vol.42
, Issue.6 SPEC. ISSUE
, pp. 1769-1780
-
-
Brassard, G.1
Crepeau, C.2
Santha, M.3
-
7
-
-
85016672373
-
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
-
R. Cramer, I. Damgard, and B. Schoenmakers. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. CRYPTO'94, pages 174-187, 1994.
-
(1994)
CRYPTO'94
, pp. 174-187
-
-
Cramer, R.1
Damgard, I.2
Schoenmakers, B.3
-
8
-
-
0032201622
-
Private Information Retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, M. Susdan. Private Information Retrieval, Journal of the ACM 45(6), pages 965-982, 1998.
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 965-982
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Susdan, M.4
-
9
-
-
84990195007
-
Transferred Cash Grows in Size
-
D. Chaum and T. Pedersen. Transferred Cash Grows in Size. EUROCRYPT'92, pages 390-407, 1993.
-
(1993)
EUROCRYPT'92
, pp. 390-407
-
-
Chaum, D.1
Pedersen, T.2
-
10
-
-
85010651974
-
A Knapsack Type Public-key Cryptosystem Based on Arithmetic in Finite Field
-
B. Chor, R. L. Rivest. A Knapsack Type Public-key Cryptosystem Based on Arithmetic in Finite Field. CRYPTO'84, pages 54-65, 1985.
-
(1985)
CRYPTO'84
, pp. 54-65
-
-
Chor, B.1
Rivest, R.L.2
-
11
-
-
0022080529
-
A Randomized Protocol for Signing Contracts
-
S. Even, O. Goldreich, A. Lempel. A Randomized Protocol for Signing Contracts, Communications of the ACM 28, pages 637-647, 1985.
-
(1985)
Communications of the ACM
, vol.28
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
12
-
-
85032194875
-
How to Solve any Protocol Problem: An Efficient Improvement
-
O. Goldreich, R. Vainish. How to Solve any Protocol Problem: An Efficient Improvement. CRYPTO'87, pages 73-86, 1988.
-
(1988)
CRYPTO'87
, pp. 73-86
-
-
Goldreich, O.1
Vainish, R.2
-
13
-
-
0026254315
-
New Multistage Knapsack Public-key Cryptosystem
-
Nov.
-
H. A. Hussain, J. W. A. Sada, and S. M. Kalipha. New Multistage Knapsack Public-key Cryptosystem. International Journal of Systems Science, Vol. 22, No. 11, pages 2313-2320, Nov. 1991.
-
(1991)
International Journal of Systems Science
, vol.22
, Issue.11
, pp. 2313-2320
-
-
Hussain, H.A.1
Sada, J.W.A.2
Kalipha, S.M.3
-
15
-
-
0018019325
-
Hiding Information and Signatures in Trapdoor Knapsack
-
R. C. Merkle, and M. Hellman. Hiding Information and Signatures in Trapdoor Knapsack. IEEE Transactions on Information Theory, Vol.24, No.5, pages 525-530, 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.5
, pp. 525-530
-
-
Merkle, R.C.1
Hellman, M.2
-
16
-
-
84937422114
-
Distributed Oblivious Transfer
-
M. Naor, B. Pinkas. Distributed Oblivious Transfer. ASIACRYPT'00, pages 205-219, 2000.
-
(2000)
ASIACRYPT'00
, pp. 205-219
-
-
Naor, M.1
Pinkas, B.2
-
17
-
-
0003462641
-
-
Technical Report TR-81, Aiken Computation Laboratory, Harvard University
-
M. Rabin. How to Exchange Secrets by Oblivious Transfer. Technical Report TR-81, Aiken Computation Laboratory, Harvard University, 1981.
-
(1981)
How to Exchange Secrets by Oblivious Transfer
-
-
Rabin, M.1
-
18
-
-
0019016485
-
On the Security of the Merkle-Hellman Cryptographic Scheme
-
May
-
A. Shamir, and A. Fiat. On the Security of the Merkle-Hellman Cryptographic Scheme. IEEE Trans. On Information Theory, Vol.26, No.3, pages 339-340, May 1980.
-
(1980)
IEEE Trans. on Information Theory
, vol.26
, Issue.3
, pp. 339-340
-
-
Shamir, A.1
Fiat, A.2
-
19
-
-
84947772655
-
A New and Efficient All-or-nothing Disclosure of Secrets Protocol
-
J. P. Stern. A New and Efficient All-or-nothing Disclosure of Secrets Protocol. ASIACRYPT'98, pages 357-371, 1998.
-
(1998)
ASIACRYPT'98
, pp. 357-371
-
-
Stern, J.P.1
-
20
-
-
0011195914
-
Secret Selling of Secrets with Several Buyers
-
A. Salomaa, L. Santean. Secret Selling of Secrets with Several Buyers. 42nd EATCS Bulletin, pages 178-186, 1990.
-
(1990)
42nd EATCS Bulletin
, pp. 178-186
-
-
Salomaa, A.1
Santean, L.2
-
21
-
-
84958985031
-
Efficient 1-out-of-n Oblivious Transfer Schemes
-
W. Tzeng. Efficient 1-out-of-n Oblivious Transfer Schemes. PKC'02, pages 159-171, 2002.
-
(2002)
PKC'02
, pp. 159-171
-
-
Tzeng, W.1
-
22
-
-
84957701870
-
Cryptanalysis of the Chor-Rivest Cryptosystem
-
S. Vaudenay. Cryptanalysis of the Chor-Rivest Cryptosystem. CRYPTO'98, pages 243-256, 1998.
-
(1998)
CRYPTO'98
, pp. 243-256
-
-
Vaudenay, S.1
|