-
1
-
-
35048875375
-
Batch verification for equality of discrete logarithms and threshold decryptions
-
Second conference of Applied Cryptography and Network Security, ACNS 04, Berlin. Springer-Verlag
-
Riza Aditya, Kun Peng, Colin Boyd, and Ed Dawson. Batch verification for equality of discrete logarithms and threshold decryptions. In Second conference of Applied Cryptography and Network Security, ACNS 04, volume 3089 of Lecture Notes in Computer Science, pages 494-508, Berlin, 2004. Springer-Verlag.
-
(2004)
Lecture Notes in Computer Science
, vol.3089
, pp. 494-508
-
-
Aditya, R.1
Peng, K.2
Boyd, C.3
Dawson, E.4
-
2
-
-
84948952992
-
Minimal-latency secure function evaluation
-
EUROCRYPT '00, Bruges, Belgium, May 14-18, 2000, Proceeding. Springer
-
D. Beaver. Minimal-latency secure function evaluation. In EUROCRYPT '00, Bruges, Belgium, May 14-18, 2000, Proceeding, volume 1807 of Lecture Notes in Computer Science, pages 335-350. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 335-350
-
-
Beaver, D.1
-
3
-
-
84898945449
-
Multi-prover interactive proofs: How to remove intractability assumptions
-
Michael Ben-Or, Shafi Goldwasser, Joe Killian, and Avi Wigderson. Multi-prover interactive proofs: How to remove intractability assumptions. In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, STOC1988, pages 113-131, 1988.
-
(1988)
Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, STOC1988
, pp. 113-131
-
-
Ben-Or, M.1
Goldwasser, S.2
Killian, J.3
Wigderson, A.4
-
4
-
-
0033280866
-
Efficient private bidding and auctions with an oblivious third party
-
Christian Cachin. Efficient private bidding and auctions with an oblivious third party. In the 6th ACM Conference on Computer and Communications Security, 1999. Available at http://www.tml.hut.fi/~helger/crypto/link/ protocols/auctions.html.
-
(1999)
The 6th ACM Conference on Computer and Communications Security
-
-
Cachin, C.1
-
5
-
-
1142307279
-
Optimistic fair secure computation
-
Berlin. Springer-Verlag. Lecture Notes in Computer Science
-
Christian Cachin and Jan Camenisch. Optimistic fair secure computation (extended abstract). In CRYPTO '00, pages 94-112, Berlin, 2000. Springer-Verlag. Lecture Notes in Computer Science 1880.
-
(2000)
CRYPTO '00
, vol.1880
, pp. 94-112
-
-
Cachin, C.1
Camenisch, J.2
-
6
-
-
84864708144
-
Multiparty computations ensuring privacy of each party's input and correctness of the result
-
Berlin. Springer-Verlag. Lecture Notes in Computer Science
-
D. Chaum, I. B. Damgård, and J. van de Graaf. Multiparty computations ensuring privacy of each party's input and correctness of the result. In CRYPTO '87, pages 87-119, Berlin, 1987. Springer-Verlag. Lecture Notes in Computer Science Volume 293.
-
(1987)
CRYPTO '87
, vol.293
, pp. 87-119
-
-
Chaum, D.1
Damgård, I.B.2
Van De Graaf, J.3
-
7
-
-
85001025766
-
Wallet databases with observers
-
Berlin. Springer-Verlag. Lecture Notes in Computer Science
-
D. Chaum and T. P. Pedersen. Wallet databases with observers. In CRYPTO '92, pages 89-105, Berlin, 1992. Springer-Verlag. Lecture Notes in Computer Science Volume 740.
-
(1992)
CRYPTO '92
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
8
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
David Chaum, Claude Crepeau, and Ivan Damgård. Multiparty unconditionally secure protocols (extended abstract). In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, STOC1988, pages 11-19, 1988.
-
(1988)
Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, STOC1988
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgård, I.3
-
9
-
-
84957717648
-
Efficient multiparty computations secure against an adaptive adversary
-
EUROCRYPT '99. Springer
-
Ronald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, and Tal Rabin. Efficient multiparty computations secure against an adaptive adversary. In EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, pages 311-326. Springer, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 311-326
-
-
Cramer, R.1
Damgård, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
10
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
EUROCRYPT '01, Innsbruck, Austria, May 6-10, 2001, Proceeding. Springer
-
Ronald Cramer, Ivan Damgård, and Jesper Buus Nielsen. Multiparty computation from threshold homomorphic encryption. In EUROCRYPT '01, Innsbruck, Austria, May 6-10, 2001, Proceeding, volume 2045 of Lecture Notes in Computer Science, pages 280-299. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 280-299
-
-
Cramer, R.1
Damgård, I.2
Nielsen, J.B.3
-
12
-
-
84937542853
-
A cost-effective pay-per-multiplication comparison method for millionaires
-
Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings. Springer
-
Marc Fischlin. A cost-effective pay-per-multiplication comparison method for millionaires. In Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings, volume 2020 of Lecture Notes in Computer Science, pages 457-472. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2020
, pp. 457-472
-
-
Fischlin, M.1
-
13
-
-
0002992068
-
Joint encryption and message-efficient secure computation
-
Matthew K. Franklin and Stuart Haber. Joint encryption and message-efficient secure computation. Journal of Cryptology 9(4), pages 217-232, 1996.
-
(1996)
Journal of Cryptology
, vol.9
, Issue.4
, pp. 217-232
-
-
Franklin, M.K.1
Haber, S.2
-
14
-
-
0001273778
-
Secure distributed key generation for discrete-log based cryptosystems
-
Berlin. Springer-Verlag. Lecture Notes in Computer Science
-
R Gennaro, S Jarecki, H Krawczyk, and T Rabin. Secure distributed key generation for discrete-log based cryptosystems. In EUROCRYPT '99, pages 123-139, Berlin, 1999. Springer-Verlag. Lecture Notes in Computer Science Volume 1592.
-
(1999)
EUROCRYPT '99
, vol.1592
, pp. 123-139
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
15
-
-
0031628398
-
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
-
Rosario Gennaro, Michael O. Rabin, and Tal Rabin. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing, PODC'98, pages 101-111, 1987.
-
(1987)
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, PODC'98
, pp. 101-111
-
-
Gennaro, R.1
Rabin, M.O.2
Rabin, T.3
-
16
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
Oded Goldreich, Silvio Micali, and Avi Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, STOC 1987, pages 218-229, 1987.
-
(1987)
Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, STOC 1987
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
17
-
-
84958742387
-
Optimistic mixing for exit-polls
-
Berlin. Springer-Verlag. Lecture Notes in Computer Science
-
Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, and Ari Juels. Optimistic mixing for exit-polls. In ASIACRYPT '02, pages 451-465, Berlin, 2002. Springer-Verlag. Lecture Notes in Computer Science Volume 1592.
-
(2002)
ASIACRYPT '02
, vol.1592
, pp. 451-465
-
-
Golle, P.1
Zhong, S.2
Boneh, D.3
Jakobsson, M.4
Juels, A.5
-
18
-
-
35248822599
-
A verifiable secret shuffle of homomorphic encryptions
-
Berlin. Springer-Verlag. Lecture Notes in Computer Science
-
Jens Groth. A verifiable secret shuffle of homomorphic encryptions. In Public Key Cryptography 2003, pages 145-160, Berlin, 2003. Springer-Verlag. Lecture Notes in Computer Science Volume 2567.
-
(2003)
Public Key Cryptography 2003
, vol.2567
, pp. 145-160
-
-
Groth, J.1
-
19
-
-
0002920278
-
Mix and match: Secure function evaluation via ciphertexts
-
Berlin. Springer-Verlag. Lecture Notes in Computer Science
-
M Jakobsson and A Juels. Mix and match: Secure function evaluation via ciphertexts. In ASIACRYPT '00, pages 143-161, Berlin, 2000. Springer-Verlag. Lecture Notes in Computer Science Volume 1976.
-
(2000)
ASIACRYPT '00
, vol.1976
, pp. 143-161
-
-
Jakobsson, M.1
Juels, A.2
-
21
-
-
84957041593
-
Bit-slice auction circuit
-
7th European Symposium on Research in Computer Security, ESORICS2002, Berlin. Springer-Verlag
-
Kaoru Kurosawa and Wakaha Ogata. Bit-slice auction circuit. In 7th European Symposium on Research in Computer Security, ESORICS2002, volume 2502 of Lecture Notes in Computer Science Volume 2339, pages 24 - 38, Berlin, 2002. Springer-Verlag.
-
(2002)
Lecture Notes in Computer Science Volume 2339
, vol.2502
, pp. 24-38
-
-
Kurosawa, K.1
Ogata, W.2
-
22
-
-
0345058962
-
Verifiable homomorphic oblivious transfer and private equality test
-
ASIACRYPT '03, Berlin. Springer
-
H. Lipmaa. Verifiable homomorphic oblivious transfer and private equality test. In ASIACRYPT '03, volume 2894 of Lecture Notes in Computer Science, pages 416-433, Berlin, 2003. Springer.
-
(2003)
Lecture Notes in Computer Science
, vol.2894
, pp. 416-433
-
-
Lipmaa, H.1
-
25
-
-
84942550998
-
Public key cryptosystem based on composite degree residuosity classes
-
Berlin. Springer-Verlag. Lecture Notes in Computer Science
-
P Paillier. Public key cryptosystem based on composite degree residuosity classes. In EUROCRYPT '99, pages 223-238, Berlin, 1999. Springer-Verlag. Lecture Notes in Computer Science Volume 1592.
-
(1999)
EUROCRYPT '99
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
26
-
-
85027158725
-
Efficient anonymous channel and all/nothing election scheme
-
Berlin. Springer-Verlag. Lecture Notes in Computer Science
-
C. Park, K. Itoh, and K. Kurosawa. Efficient anonymous channel and all/nothing election scheme. In EUROCRYPT '93, pages 248-259, Berlin, 1993. Springer-Verlag. Lecture Notes in Computer Science Volume 765.
-
(1993)
EUROCRYPT '93
, vol.765
, pp. 248-259
-
-
Park, C.1
Itoh, K.2
Kurosawa, K.3
-
27
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
Berlin. Springer-Verlag. Lecture Notes in Computer Science
-
Torben P. Pedersen. A threshold cryptosystem without a trusted party. In EUROCRYPT '91, pages 522-526, Berlin, 1991. Springer-Verlag. Lecture Notes in Computer Science Volume 547.
-
(1991)
EUROCRYPT '91
, vol.547
, pp. 522-526
-
-
Pedersen, T.P.1
-
28
-
-
0346179737
-
-
PhD thesis, Computer Science Department, Aarhus University,Aarhus, Denmark
-
Torben P. Pedersen. Distributed Provers and Verifiable Secret Sharing Based on the Discrete Logarithm Problem. PhD thesis, Computer Science Department, Aarhus University,Aarhus, Denmark, 1992.
-
(1992)
Distributed Provers and Verifiable Secret Sharing Based on the Discrete Logarithm Problem
-
-
Pedersen, T.P.1
-
29
-
-
35048879165
-
Efficient implementation of relative bid privacy in sealed-bid auction
-
The 4th International Workshop on Information Security Applications, WISA2003, Berlin. Springer-Verlag
-
Kun Peng, Colin Boyd, Edward Dawson, and Kapali Viswanathan. Efficient implementation of relative bid privacy in sealed-bid auction. In The 4th International Workshop on Information Security Applications, WISA2003, volume 2908 of Lecture Notes in Computer Science, pages 244-256, Berlin, 2003. Springer-Verlag.
-
(2003)
Lecture Notes in Computer Science
, vol.2908
, pp. 244-256
-
-
Peng, K.1
Boyd, C.2
Dawson, E.3
Viswanathan, K.4
-
30
-
-
35048899692
-
A correct, private and efficient mix network
-
Berlin. Springer-Verlag
-
Kun Peng, Colin Boyd, Edward Dawson, and Kapali Viswanathan. A correct, private and efficient mix network. In 2004 International Workshop on Practice and Theory in Public Key Cryptography, pages 439-454, Berlin, 2004. Springer-Verlag.
-
(2004)
2004 International Workshop on Practice and Theory in Public Key Cryptography
, pp. 439-454
-
-
Peng, K.1
Boyd, C.2
Dawson, E.3
Viswanathan, K.4
-
31
-
-
0033309271
-
1
-
1. In 40th Annual Symposium on Foundations of Computer Science, New York, NY, USA, FOCS '99, pages 554-567, 1999.
-
(1999)
40th Annual Symposium on Foundations of Computer Science, New York, NY, USA, FOCS '99
, pp. 554-567
-
-
Sander, T.1
Young, A.2
Yung, M.3
-
32
-
-
12344258539
-
Efficient signature generation by smart cards
-
1991
-
C Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4, 1991, pages 161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, C.1
|