메뉴 건너뛰기




Volumn 3506, Issue , 2005, Pages 51-66

An efficient and verifiable solution to the millionaire problem

Author keywords

Batch equation; Efficiency; Millionaire problem; Verifiability; Zero test

Indexed keywords

COMPUTER SCIENCE; CRYPTOGRAPHY; EFFICIENCY; INFORMATION RETRIEVAL; INTEGER PROGRAMMING; SECURITY OF DATA;

EID: 24944554813     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11496618_6     Document Type: Conference Paper
Times cited : (6)

References (32)
  • 1
    • 35048875375 scopus 로고    scopus 로고
    • Batch verification for equality of discrete logarithms and threshold decryptions
    • Second conference of Applied Cryptography and Network Security, ACNS 04, Berlin. Springer-Verlag
    • Riza Aditya, Kun Peng, Colin Boyd, and Ed Dawson. Batch verification for equality of discrete logarithms and threshold decryptions. In Second conference of Applied Cryptography and Network Security, ACNS 04, volume 3089 of Lecture Notes in Computer Science, pages 494-508, Berlin, 2004. Springer-Verlag.
    • (2004) Lecture Notes in Computer Science , vol.3089 , pp. 494-508
    • Aditya, R.1    Peng, K.2    Boyd, C.3    Dawson, E.4
  • 2
    • 84948952992 scopus 로고    scopus 로고
    • Minimal-latency secure function evaluation
    • EUROCRYPT '00, Bruges, Belgium, May 14-18, 2000, Proceeding. Springer
    • D. Beaver. Minimal-latency secure function evaluation. In EUROCRYPT '00, Bruges, Belgium, May 14-18, 2000, Proceeding, volume 1807 of Lecture Notes in Computer Science, pages 335-350. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 335-350
    • Beaver, D.1
  • 4
    • 0033280866 scopus 로고    scopus 로고
    • Efficient private bidding and auctions with an oblivious third party
    • Christian Cachin. Efficient private bidding and auctions with an oblivious third party. In the 6th ACM Conference on Computer and Communications Security, 1999. Available at http://www.tml.hut.fi/~helger/crypto/link/ protocols/auctions.html.
    • (1999) The 6th ACM Conference on Computer and Communications Security
    • Cachin, C.1
  • 5
    • 1142307279 scopus 로고    scopus 로고
    • Optimistic fair secure computation
    • Berlin. Springer-Verlag. Lecture Notes in Computer Science
    • Christian Cachin and Jan Camenisch. Optimistic fair secure computation (extended abstract). In CRYPTO '00, pages 94-112, Berlin, 2000. Springer-Verlag. Lecture Notes in Computer Science 1880.
    • (2000) CRYPTO '00 , vol.1880 , pp. 94-112
    • Cachin, C.1    Camenisch, J.2
  • 6
    • 84864708144 scopus 로고
    • Multiparty computations ensuring privacy of each party's input and correctness of the result
    • Berlin. Springer-Verlag. Lecture Notes in Computer Science
    • D. Chaum, I. B. Damgård, and J. van de Graaf. Multiparty computations ensuring privacy of each party's input and correctness of the result. In CRYPTO '87, pages 87-119, Berlin, 1987. Springer-Verlag. Lecture Notes in Computer Science Volume 293.
    • (1987) CRYPTO '87 , vol.293 , pp. 87-119
    • Chaum, D.1    Damgård, I.B.2    Van De Graaf, J.3
  • 7
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • Berlin. Springer-Verlag. Lecture Notes in Computer Science
    • D. Chaum and T. P. Pedersen. Wallet databases with observers. In CRYPTO '92, pages 89-105, Berlin, 1992. Springer-Verlag. Lecture Notes in Computer Science Volume 740.
    • (1992) CRYPTO '92 , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 9
    • 84957717648 scopus 로고    scopus 로고
    • Efficient multiparty computations secure against an adaptive adversary
    • EUROCRYPT '99. Springer
    • Ronald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, and Tal Rabin. Efficient multiparty computations secure against an adaptive adversary. In EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, pages 311-326. Springer, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 311-326
    • Cramer, R.1    Damgård, I.2    Dziembowski, S.3    Hirt, M.4    Rabin, T.5
  • 10
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty computation from threshold homomorphic encryption
    • EUROCRYPT '01, Innsbruck, Austria, May 6-10, 2001, Proceeding. Springer
    • Ronald Cramer, Ivan Damgård, and Jesper Buus Nielsen. Multiparty computation from threshold homomorphic encryption. In EUROCRYPT '01, Innsbruck, Austria, May 6-10, 2001, Proceeding, volume 2045 of Lecture Notes in Computer Science, pages 280-299. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 280-299
    • Cramer, R.1    Damgård, I.2    Nielsen, J.B.3
  • 12
    • 84937542853 scopus 로고    scopus 로고
    • A cost-effective pay-per-multiplication comparison method for millionaires
    • Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings. Springer
    • Marc Fischlin. A cost-effective pay-per-multiplication comparison method for millionaires. In Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings, volume 2020 of Lecture Notes in Computer Science, pages 457-472. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2020 , pp. 457-472
    • Fischlin, M.1
  • 13
    • 0002992068 scopus 로고    scopus 로고
    • Joint encryption and message-efficient secure computation
    • Matthew K. Franklin and Stuart Haber. Joint encryption and message-efficient secure computation. Journal of Cryptology 9(4), pages 217-232, 1996.
    • (1996) Journal of Cryptology , vol.9 , Issue.4 , pp. 217-232
    • Franklin, M.K.1    Haber, S.2
  • 14
    • 0001273778 scopus 로고    scopus 로고
    • Secure distributed key generation for discrete-log based cryptosystems
    • Berlin. Springer-Verlag. Lecture Notes in Computer Science
    • R Gennaro, S Jarecki, H Krawczyk, and T Rabin. Secure distributed key generation for discrete-log based cryptosystems. In EUROCRYPT '99, pages 123-139, Berlin, 1999. Springer-Verlag. Lecture Notes in Computer Science Volume 1592.
    • (1999) EUROCRYPT '99 , vol.1592 , pp. 123-139
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 17
    • 84958742387 scopus 로고    scopus 로고
    • Optimistic mixing for exit-polls
    • Berlin. Springer-Verlag. Lecture Notes in Computer Science
    • Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, and Ari Juels. Optimistic mixing for exit-polls. In ASIACRYPT '02, pages 451-465, Berlin, 2002. Springer-Verlag. Lecture Notes in Computer Science Volume 1592.
    • (2002) ASIACRYPT '02 , vol.1592 , pp. 451-465
    • Golle, P.1    Zhong, S.2    Boneh, D.3    Jakobsson, M.4    Juels, A.5
  • 18
    • 35248822599 scopus 로고    scopus 로고
    • A verifiable secret shuffle of homomorphic encryptions
    • Berlin. Springer-Verlag. Lecture Notes in Computer Science
    • Jens Groth. A verifiable secret shuffle of homomorphic encryptions. In Public Key Cryptography 2003, pages 145-160, Berlin, 2003. Springer-Verlag. Lecture Notes in Computer Science Volume 2567.
    • (2003) Public Key Cryptography 2003 , vol.2567 , pp. 145-160
    • Groth, J.1
  • 19
    • 0002920278 scopus 로고    scopus 로고
    • Mix and match: Secure function evaluation via ciphertexts
    • Berlin. Springer-Verlag. Lecture Notes in Computer Science
    • M Jakobsson and A Juels. Mix and match: Secure function evaluation via ciphertexts. In ASIACRYPT '00, pages 143-161, Berlin, 2000. Springer-Verlag. Lecture Notes in Computer Science Volume 1976.
    • (2000) ASIACRYPT '00 , vol.1976 , pp. 143-161
    • Jakobsson, M.1    Juels, A.2
  • 21
    • 84957041593 scopus 로고    scopus 로고
    • Bit-slice auction circuit
    • 7th European Symposium on Research in Computer Security, ESORICS2002, Berlin. Springer-Verlag
    • Kaoru Kurosawa and Wakaha Ogata. Bit-slice auction circuit. In 7th European Symposium on Research in Computer Security, ESORICS2002, volume 2502 of Lecture Notes in Computer Science Volume 2339, pages 24 - 38, Berlin, 2002. Springer-Verlag.
    • (2002) Lecture Notes in Computer Science Volume 2339 , vol.2502 , pp. 24-38
    • Kurosawa, K.1    Ogata, W.2
  • 22
    • 0345058962 scopus 로고    scopus 로고
    • Verifiable homomorphic oblivious transfer and private equality test
    • ASIACRYPT '03, Berlin. Springer
    • H. Lipmaa. Verifiable homomorphic oblivious transfer and private equality test. In ASIACRYPT '03, volume 2894 of Lecture Notes in Computer Science, pages 416-433, Berlin, 2003. Springer.
    • (2003) Lecture Notes in Computer Science , vol.2894 , pp. 416-433
    • Lipmaa, H.1
  • 25
    • 84942550998 scopus 로고    scopus 로고
    • Public key cryptosystem based on composite degree residuosity classes
    • Berlin. Springer-Verlag. Lecture Notes in Computer Science
    • P Paillier. Public key cryptosystem based on composite degree residuosity classes. In EUROCRYPT '99, pages 223-238, Berlin, 1999. Springer-Verlag. Lecture Notes in Computer Science Volume 1592.
    • (1999) EUROCRYPT '99 , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 26
    • 85027158725 scopus 로고
    • Efficient anonymous channel and all/nothing election scheme
    • Berlin. Springer-Verlag. Lecture Notes in Computer Science
    • C. Park, K. Itoh, and K. Kurosawa. Efficient anonymous channel and all/nothing election scheme. In EUROCRYPT '93, pages 248-259, Berlin, 1993. Springer-Verlag. Lecture Notes in Computer Science Volume 765.
    • (1993) EUROCRYPT '93 , vol.765 , pp. 248-259
    • Park, C.1    Itoh, K.2    Kurosawa, K.3
  • 27
    • 85030460443 scopus 로고
    • A threshold cryptosystem without a trusted party
    • Berlin. Springer-Verlag. Lecture Notes in Computer Science
    • Torben P. Pedersen. A threshold cryptosystem without a trusted party. In EUROCRYPT '91, pages 522-526, Berlin, 1991. Springer-Verlag. Lecture Notes in Computer Science Volume 547.
    • (1991) EUROCRYPT '91 , vol.547 , pp. 522-526
    • Pedersen, T.P.1
  • 29
    • 35048879165 scopus 로고    scopus 로고
    • Efficient implementation of relative bid privacy in sealed-bid auction
    • The 4th International Workshop on Information Security Applications, WISA2003, Berlin. Springer-Verlag
    • Kun Peng, Colin Boyd, Edward Dawson, and Kapali Viswanathan. Efficient implementation of relative bid privacy in sealed-bid auction. In The 4th International Workshop on Information Security Applications, WISA2003, volume 2908 of Lecture Notes in Computer Science, pages 244-256, Berlin, 2003. Springer-Verlag.
    • (2003) Lecture Notes in Computer Science , vol.2908 , pp. 244-256
    • Peng, K.1    Boyd, C.2    Dawson, E.3    Viswanathan, K.4
  • 32
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • 1991
    • C Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4, 1991, pages 161-174, 1991.
    • (1991) Journal of Cryptology , vol.4 , pp. 161-174
    • Schnorr, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.