-
1
-
-
84958744427
-
1-out-of-n signatures from a variety of keys
-
Springer-Verlag
-
M. Abe, M. Ohkubo, and K. Suzuki. 1-out-of-n Signatures from a Variety of Keys. Asiacrypt'02, Springer-Verlag, pp.415-432, 2002.
-
(2002)
Asiacrypt'02
, pp. 415-432
-
-
Abe, M.1
Ohkubo, M.2
Suzuki, K.3
-
2
-
-
84947271111
-
How to break a "secure" oblivious transfer protocols
-
Eurocrypt'92, Springer-Verlag
-
D. Beaver. How to Break a "Secure" Oblivious Transfer Protocols. Eurocrypt'92, LNCS 658, Springer-Verlag, pp.285-196, 1993.
-
(1993)
LNCS
, vol.658
, pp. 285-1196
-
-
Beaver, D.1
-
3
-
-
84888252697
-
All-or-nothing disclosure of secrets
-
Crypto'86, Springer-Verlag
-
G. Brassard, C. Crépeau, J.-M. Roberts. All-or-Nothing Disclosure of Secrets, Crypto'86, LNCS 263, Springer-Verlag, pp.234-238, 1987.
-
(1987)
LNCS
, vol.263
, pp. 234-238
-
-
Brassard, G.1
Crépeau, C.2
Roberts, J.-M.3
-
4
-
-
0030283655
-
Oblivious transfer and intersecting codes
-
G. Brassard, C. Crépeau, M. Santha. Oblivious Transfer and Intersecting Codes. IEEE Trans. on Inf. Th., special issue in coding and complexity, Vol. 42, No. 6, pp.1769-1780, 1996.
-
(1996)
IEEE Trans. on Inf. Th., Special Issue in Coding and Complexity
, vol.42
, Issue.6
, pp. 1769-1780
-
-
Brassard, G.1
Crépeau, C.2
Santha, M.3
-
6
-
-
85032877753
-
Non-interactive oblivious transfer
-
Crypto'89, Springer-Verlag
-
M. Bellare, S. Micali. Non-interactive Oblivious Transfer. Crypto'89, LNCS 435, Springer-Verlag, pp.547-557, 1990.
-
(1990)
LNCS 435
, pp. 547-557
-
-
Bellare, M.1
Micali, S.2
-
7
-
-
84957712978
-
On the foundations of oblivious transfer
-
Eurocrypt'98, Springer-Verlag
-
C. Cachin. On the Foundations of Oblivious Transfer. Eurocrypt'98, LNCS 1403, Springer-Verlag, pp.361-374, 1998.
-
(1998)
LNCS 1403
, pp. 361-374
-
-
Cachin, C.1
-
8
-
-
85023982750
-
An improved protocol for demonstrating possession of discrete logarithm and some generalizations
-
Springer-Verlag
-
D. Chaum, J. H. Evertse, V. de Graaf. An Improved Protocol for Demonstrating Possession of Discrete Logarithm and Some Generalizations. Eurocrypt'87. Springer-Verlag, pp.127-141, 1987.
-
(1987)
Eurocrypt'87
, pp. 127-141
-
-
Chaum, D.1
Evertse, J.H.2
De Graaf, V.3
-
9
-
-
0032201622
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, M. Susdan. Private Information Retrieval. Journal of the ACM 45(6), pp.965-982, 1998.
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 965-982
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Susdan, M.4
-
10
-
-
85001025766
-
Wallet databases with observers
-
Proc. CRYPTO'92, Springer-Verlag
-
D. Chaum and T.P. Pedersen. Wallet databases with observers. Proc. CRYPTO'92, LNCS 740, pp. 89-105. Springer-Verlag, 1993.
-
(1993)
LNCS
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
11
-
-
85030121757
-
Equivalence between two flavors of oblivious transfers
-
Crypto'87, Springer-Verlag
-
C. Crépeau. Equivalence between Two Flavors of Oblivious Transfers. Crypto'87, LNCS 293, Springer-Verlag, pp.350-354, 1988.
-
(1988)
LNCS
, vol.293
, pp. 350-354
-
-
Crépeau, C.1
-
13
-
-
85032883059
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
Springer-verlag
-
T. ElGamal. A public-key cryptosystem and a signature scheme based on discrete logarithms. Crypto'84, Springer-verlag pp. 10-18, 1985.
-
(1985)
Crypto'84
, pp. 10-18
-
-
Elgamal, T.1
-
14
-
-
85032194875
-
How to solve any protocol problem: An efficient improvement
-
Crypto'87, Springer-Ver lag
-
O. Goldreich, R. Vainish. How to Solve any Protocol Problem: An Efficient Improvement. Crypto'87, LNCS 293, Springer-Ver lag, pp.73-86, 1988.
-
(1988)
LNCS
, vol.293
, pp. 73-86
-
-
Goldreich, O.1
Vainish, R.2
-
15
-
-
24144457853
-
Extending oblivious transfers E.ciently
-
CRYPTO 2003
-
Y. Ishai, J. Kilian, K. Nissim, and E. Petrankl. Extending Oblivious Transfers E.ciently. CRYPTO 2003, LNCS 2729, pp.145-161, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrankl, E.4
-
17
-
-
84947426400
-
M out of n oblivious transfer
-
ACISP 2002, Springer-Verlag
-
Y. Mu, J. Zhang, and V. Varadharajan. m out of n oblivious transfer. ACISP 2002, LNCS 2384, Springer-Verlag, pp.395-405, 2002.
-
(2002)
LNCS
, vol.2384
, pp. 395-405
-
-
Mu, Y.1
Zhang, J.2
Varadharajan, V.3
-
20
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Springer-Ver lag
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. Eurocrypt'99, Springer-Ver lag, pp.223-238, 1999.
-
(1999)
Eurocrypt'99
, pp. 223-238
-
-
Paillier, P.1
-
21
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Aiken Computation Laboratory, Harvard University
-
M. Rabin. How to Exchange Secrets by Oblivious Transfer. Technical Report TR-81, Aiken Computation Laboratory, Harvard University, 1981.
-
(1981)
Technical Report
, vol.TR-81
-
-
Rabin, M.1
-
22
-
-
84947772655
-
A new and efficient all-or-nothing disclosure of secrets protocol
-
Asiacrypt'98, Springer-Verlag
-
J. P. Stern. A New and Efficient All-or-nothing Disclosure of Secrets Protocol. Asiacrypt'98, LNCS 1514, Springer-Verlag, pp. 357-371, 1998.
-
(1998)
LNCS
, vol.1514
, pp. 357-371
-
-
Stern, J.P.1
-
23
-
-
84958985031
-
Efficient 1-out-of-n oblivious transfer schemes
-
PKC'02, Springer-Ver lag
-
W. Tzeng. Efficient 1-out-of-n Oblivious Transfer Schemes. PKC'02, LNCS 2274, Springer-Ver lag, pp. 159-171, 2002.
-
(2002)
LNCS
, vol.2274
, pp. 159-171
-
-
Tzeng, W.1
-
25
-
-
0142218971
-
Practical t-out-n oblivious transfer and its applications
-
ICICS 2003, Springer-verlag
-
Q. Wu, J. Zhang, Y. Wang. Practical t-out-n oblivious transfer and its applications. ICICS 2003, LNCS 2836, Springer-verlag, pp.226-237, 2003
-
(2003)
LNCS
, vol.2836
, pp. 226-237
-
-
Wu, Q.1
Zhang, J.2
Wang, Y.3
|