-
1
-
-
63449118333
-
Flaws in Some Robust Optimistic Mix-nets
-
ACISP 2003
-
M. Abe and H. Imai. Flaws in Some Robust Optimistic Mix-nets. ACISP 2003, LNCS 2727, pp. 39-50.
-
LNCS
, vol.2727
, pp. 39-50
-
-
Abe, M.1
Imai, H.2
-
2
-
-
0010280770
-
An efficient off-line electronic cash system based on the representation problem
-
S. Brands. An efficient off-line electronic cash system based on the representation problem. CWI Technical Report CS-R9323, 1993.
-
(1993)
CWI Technical Report CS-R9323
-
-
Brands, S.1
-
3
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
4
-
-
23844516584
-
Authentication and Payment Protocol Preserving Location Privacy in Mobile IP
-
S. Choi and K. Kim. Authentication and Payment Protocol Preserving Location Privacy in Mobile IP. GLOBECOM 2003.
-
GLOBECOM 2003
-
-
Choi, S.1
Kim, K.2
-
5
-
-
84946827596
-
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
-
Asiacrypt 2001
-
P. Fouque and D. Pointcheval. Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. Asiacrypt 2001, LNCS 2248, pp. 351-369.
-
LNCS
, vol.2248
, pp. 351-369
-
-
Fouque, P.1
Pointcheval, D.2
-
6
-
-
84880857711
-
An Efficient Scheme for Proving a Shuffle
-
Crypto 2001
-
J. Furukawa and K. Sako. An Efficient Scheme for Proving a Shuffle. Crypto 2001, LNCS 2139, pp. 368-387.
-
LNCS
, vol.2139
, pp. 368-387
-
-
Furukawa, J.1
Sako, K.2
-
7
-
-
84956996576
-
An Implementation of a Universally Verifiable Electronic Voting Scheme based on Shuffling
-
Financial Cryptography 2002
-
J. Furukawa, H. Miyauchi, K. Mori, S. Obana and K. Sako. An Implementation of a Universally Verifiable Electronic Voting Scheme based on Shuffling. Financial Cryptography 2002, LNCS 2357.
-
LNCS
, vol.2357
-
-
Furukawa, J.1
Miyauchi, H.2
Mori, K.3
Obana, S.4
Sako, K.5
-
8
-
-
35048861845
-
Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability
-
PKC 2004
-
J. Furukawa. Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability. PKC 2004, LNCS 2947, pp. 319-332.
-
LNCS
, vol.2947
, pp. 319-332
-
-
Furukawa, J.1
-
9
-
-
84948946447
-
How to make personalized Web browsing simple, secure, and anonymous
-
Financial Cryptography 1997
-
E. Gabber, P. Gibbons, Y. Matias, and A. Mayer. How to make personalized Web browsing simple, secure, and anonymous. Financial Cryptography 1997, LNCS 1318, pp. 17-31.
-
LNCS
, vol.1318
, pp. 17-31
-
-
Gabber, E.1
Gibbons, P.2
Matias, Y.3
Mayer, A.4
-
12
-
-
84958742387
-
Optimistic Mixing for Exit-Polls
-
Asiacrypt 2002
-
P. Golle, S. Zhong, D. Boneh, M. Jakobsson and A. Juels. Optimistic Mixing for Exit-Polls. Asiacrypt 2002, LNCS 2501, pp. 451-465.
-
LNCS
, vol.2501
, pp. 451-465
-
-
Golle, P.1
Zhong, S.2
Boneh, D.3
Jakobsson, M.4
Juels, A.5
-
13
-
-
35248822599
-
A Verifiable Secret Shuffle of Homomorphic Encryptions
-
PKC 2003
-
J. Groth. A Verifiable Secret Shuffle of Homomorphic Encryptions. PKC 2003, LNCS 2567, pp. 145-160.
-
LNCS
, vol.2567
, pp. 145-160
-
-
Groth, J.1
-
14
-
-
84937417083
-
Mix and match: Secure function evaluation via ciphertexts
-
Asiacrypt 2000
-
M. Jakobsson and A. Juels. Mix and match: Secure function evaluation via ciphertexts. Asiacrypt 2000, LNCS 1976, pp. 162-177.
-
LNCS
, vol.1976
, pp. 162-177
-
-
Jakobsson, M.1
Juels, A.2
-
15
-
-
84937572541
-
Targeted advertising and privacy too
-
RSA Conference Cryptographers' Track 2001
-
A. Juels. Targeted advertising and privacy too. RSA Conference Cryptographers' Track 2001, LNCS 2020, pp. 408-425.
-
LNCS
, vol.2020
, pp. 408-425
-
-
Juels, A.1
-
17
-
-
0024983231
-
Public-Key Cryptosystems Provably Secure against Chosen Ciphertexts Attacks
-
M. Naor and M. Yung. Public-Key Cryptosystems Provably Secure against Chosen Ciphertexts Attacks. ACM STOC 1990, pp. 427-437.
-
ACM STOC 1990
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
18
-
-
0035754862
-
A verifiable secret shuffle and its application to e-voting
-
A. Neff. A verifiable secret shuffle and its application to e-voting. ACM CCS 2001, pp. 116-125.
-
ACM CCS 2001
, pp. 116-125
-
-
Neff, A.1
-
20
-
-
33749003289
-
Breaking and Mending Resilient Mix-nets
-
Privacy Enhancing Technologies workshop (PET) 2003
-
L. Nguyen and R. Safavi-Naini. Breaking and Mending Resilient Mix-nets. Privacy Enhancing Technologies workshop (PET) 2003, LNCS 2760, pp. 66-80.
-
LNCS
, vol.2760
, pp. 66-80
-
-
Nguyen, L.1
Safavi-Naini, R.2
-
22
-
-
84942550998
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
Eurocrypt 1999
-
P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. Eurocrypt 1999, LNCS 1592, pp. 223-239.
-
LNCS
, vol.1592
, pp. 223-239
-
-
Paillier, P.1
-
24
-
-
84974715989
-
The security of a mix-center based on a semantically secure cryptosystem
-
Indocrypt 2002
-
D. Wikstrom. The security of a mix-center based on a semantically secure cryptosystem. Indocrypt 2002, LNCS 2551, pp. 368-381.
-
LNCS
, vol.2551
, pp. 368-381
-
-
Wikstrom, D.1
-
25
-
-
35048848969
-
Five Practical Attacks for "Optimistic Mixing for Exit-Polls"
-
SAC 2003
-
D. Wikstrom. Five Practical Attacks for "Optimistic Mixing for Exit-Polls". SAC 2003, LNCS 3006.
-
LNCS
, vol.3006
-
-
Wikstrom, D.1
|