-
1
-
-
84958964379
-
M+1-st price auction using homomorphic encryption
-
[AS02]. Proc. of 5th International Conference on Public Key Cryptography (PKC). Springer
-
[AS02] M. Abe and K. Suzuki. M+1-st price auction using homomorphic encryption. In Proc. of 5th International Conference on Public Key Cryptography (PKC), volume 2274 of LNCS, pages 115-224. Springer, 2002.
-
(2002)
LNCS
, vol.2274
, pp. 115-224
-
-
Abe, M.1
Suzuki, K.2
-
2
-
-
18744397335
-
Secure and private auctions without auctioneers
-
[Bra02], Technical University of Munich. ISSN 0941-6358
-
[Bra02] F. Brandt. Secure and private auctions without auctioneers. Technical Report FKI-245-02, Technical University of Munich, 2002. ISSN 0941-6358.
-
(2002)
Technical Report
, vol.FKI-245-02
-
-
Brandt, F.1
-
3
-
-
35248842111
-
Fully private auctions in a constant number of rounds
-
[Bra03a]. R. N. Wright, editor, Proc. of 7th FC Conference. Springer
-
[Bra03a] F. Brandt. Fully private auctions in a constant number of rounds. In R. N. Wright, editor, Proc. of 7th FC Conference, volume 2742 of LNCS, pages 223-238. Springer, 2003.
-
(2003)
LNCS
, vol.2742
, pp. 223-238
-
-
Brandt, F.1
-
4
-
-
0242708796
-
Social choice and preference protection - Towards fully private mechanism design
-
[Bra03b]. N. Nisan, editor. ACM Press
-
[Bra03b] F. Brandt. Social choice and preference protection - Towards fully private mechanism design. In N. Nisan, editor, Proc. of 4th ACM Conference on Electronic Commerce, pages 220-221. ACM Press, 2003.
-
(2003)
Proc. of 4th ACM Conference on Electronic Commerce
, pp. 220-221
-
-
Brandt, F.1
-
5
-
-
0041863132
-
Non-interactive private auctions
-
[BS01]
-
[BS01] O. Baudron and J. Stern. Non-interactive private auctions. In Proc. of 5th FC Conference, pages 300-313, 2001.
-
(2001)
Proc. of 5th FC Conference
, pp. 300-313
-
-
Baudron, O.1
Stern, J.2
-
6
-
-
4544319920
-
(Im)possibility of unconditionally privacy-preserving auctions
-
[BS04a]. C. Sierra and L. Sonenberg, editors. ACM Press
-
[BS04a] F. Brandt and T. Sandholm. (Im)possibility of unconditionally privacy-preserving auctions. In C. Sierra and L. Sonenberg, editors, Proc. of 3rd AAMAS Conference, pages 810-817. ACM Press, 2004.
-
(2004)
Proc. of 3rd AAMAS Conference
, pp. 810-817
-
-
Brandt, F.1
Sandholm, T.2
-
7
-
-
26444575916
-
On correctness and privacy in distributed mechanisms
-
[BS04b]. P. Faratin and J. A. Rodriguez-Aguilar, editors, LNAI
-
[BS04b] F. Brandt and T. Sandholm. On correctness and privacy in distributed mechanisms. In P. Faratin and J. A. Rodriguez-Aguilar, editors, Selected and revised papers from the 6th AAMAS Workshop on Agent-Mediated Electronic Commerce (AMEC), LNAI, pages 1-14, 2004.
-
(2004)
Selected and Revised Papers from the 6th AAMAS Workshop on Agent-Mediated Electronic Commerce (AMEC)
, pp. 1-14
-
-
Brandt, F.1
Sandholm, T.2
-
8
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
[CDS94]. Proc. of 14th CRYPTO Conference. Springer
-
[CDS94] R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Proc. of 14th CRYPTO Conference, volume 893 of LNCS, pages 174-187. Springer, 1994.
-
(1994)
LNCS
, vol.893
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
9
-
-
34250446073
-
Multipart pricing of public goods
-
[Cla71]
-
[Cla71] E. H. Clarke. Multipart pricing of public goods. Public Choice, 11:17-33, 1971.
-
(1971)
Public Choice
, vol.11
, pp. 17-33
-
-
Clarke, E.H.1
-
10
-
-
0002187137
-
Wallet databases with observers
-
[CP92]. Proc. of 12th CRYPTO Conference. Springer
-
[CP92] D. Chaum and T. P. Pedersen. Wallet databases with observers. In Proc. of 12th CRYPTO Conference, volume 740 of LNCS, pages 3.1-3.6. Springer, 1992.
-
(1992)
LNCS
, vol.740
-
-
Chaum, D.1
Pedersen, T.P.2
-
12
-
-
84864794192
-
On Σ-protocols
-
[Dam02], University of Aarhus, Department for Computer Science
-
[Dam02] I. Damgård. On Σ-protocols. Lecture Notes, University of Aarhus, Department for Computer Science, 2002.
-
(2002)
Lecture Notes
-
-
Damgård, I.1
-
13
-
-
84880875026
-
Robust non-interactive zero knowledge
-
[DDO+01]. Proc. of 21th CRYPTO Conference. Springer
-
[DDO+01] A. De Santis, G. Di Crescenzo, R. Ostrovsky, G. Persiano, and A. Sahai. Robust non-interactive zero knowledge. In Proc. of 21th CRYPTO Conference, volume 2139 of LNCS, pages 566-598. Springer, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 566-598
-
-
De Santis, A.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
Sahai, A.5
-
14
-
-
85088744812
-
Private selective payment protocols
-
[Di 00]. Proc. of 4th FC Conference. Springer
-
[Di 00] G. Di Crescenzo. Private selective payment protocols. In Proc. of 4th FC Conference, volume 1962 of LNCS. Springer, 2000.
-
(2000)
LNCS
, vol.1962
-
-
Di Crescenzo, G.1
-
15
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
[El 85]
-
[El 85] T. El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31:469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
El Gamal, T.1
-
16
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
[FS87], LNCS. Springer
-
[FS87] A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Proc. of 12th CRYPTO Conference, LNCS, pages 186-194. Springer, 1987.
-
(1987)
Proc. of 12th CRYPTO Conference
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
17
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
[GL90]. Proc. of 10th CRYPTO Conference. Springer
-
[GL90] S. Goldwasser and L. Levin. Fair computation of general functions in presence of immoral majority. In Proc. of 10th CRYPTO Conference, volume 537 of LNCS, pages 77-93. Springer, 1990.
-
(1990)
LNCS
, vol.537
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
18
-
-
84947284060
-
Secure computation without agreement
-
[GL02]. Proc. of 16th International Symposium on Distributed Computing (DISC). Springer
-
[GL02] S. Goldwasser and Y. Lindell. Secure computation without agreement. In Proc. of 16th International Symposium on Distributed Computing (DISC), volume 2508 of LNCS, pages 17-32. Springer, 2002.
-
(2002)
LNCS
, vol.2508
, pp. 17-32
-
-
Goldwasser, S.1
Lindell, Y.2
-
19
-
-
0001314984
-
Incentives in teams
-
[Gro73]
-
[Gro73] T. Groves. Incentives in teams. Econometrica, 41:617-631, 1973.
-
(1973)
Econometrica
, vol.41
, pp. 617-631
-
-
Groves, T.1
-
20
-
-
34548150228
-
Efficient maximal privacy in boardroom voting and anonymous broadcast
-
[Gro04]. Proc. of 8th FC Conference. Springer
-
[Gro04] J. Groth. Efficient maximal privacy in boardroom voting and anonymous broadcast. In Proc. of 8th FC Conference, volume 3110 of LNCS, pages 90-104. Springer, 2004.
-
(2004)
LNCS
, vol.3110
, pp. 90-104
-
-
Groth, J.1
-
21
-
-
84957011768
-
A two-server, sealed-bid auction protocol
-
[JS02]. M. Blaze, editor, Proc. of 6th FC Conference. Springer
-
[JS02] A. Juels and M. Szydlo. A two-server, sealed-bid auction protocol. In M. Blaze, editor, Proc. of 6th FC Conference, volume 2357 of LNCS. Springer, 2002.
-
(2002)
LNCS
, vol.2357
-
-
Juels, A.1
Szydlo, M.2
-
22
-
-
80555144158
-
(M+1)st-price auction protocol
-
[Kik01]. Proc. of 5th FC Conference. Springer
-
[Kik01] H. Kikuchi. (M+1)st-price auction protocol. In Proc. of 5th FC Conference, volume 2339 of LNCS, pages 351-363. Springer, 2001.
-
(2001)
LNCS
, vol.2339
, pp. 351-363
-
-
Kikuchi, H.1
-
23
-
-
0032804976
-
Auction theory: A guide to the literature
-
[Kle99]
-
[Kle99] P. Klemperer. Auction theory: A guide to the literature. Journal of Economic Surveys, 13(3):227-286, 1999.
-
(1999)
Journal of Economic Surveys
, vol.13
, Issue.3
, pp. 227-286
-
-
Klemperer, P.1
-
25
-
-
84958969942
-
Self-tallying elections and perfect ballot secrecy
-
[KY02], number 2274 in LNCS. Springer
-
[KY02] A. Kiayias and M. Yung. Self-tallying elections and perfect ballot secrecy. In Proc. of 5th PKC Conference, number 2274 in LNCS, pages 141-158. Springer, 2002.
-
(2002)
Proc. of 5th PKC Conference
, pp. 141-158
-
-
Kiayias, A.1
Yung, M.2
-
26
-
-
35048870415
-
Non-interactive zero-sharing with applications to private distributed decision making
-
[KY03]. Proc. of 7th FC Conference. Springer
-
[KY03] A. Kiayias and M. Yung. Non-interactive zero-sharing with applications to private distributed decision making. In Proc. of 7th FC Conference, volume 2742 of LNCS, pages 303-320. Springer, 2003.
-
(2003)
LNCS
, vol.2742
, pp. 303-320
-
-
Kiayias, A.1
Yung, M.2
-
27
-
-
84957026937
-
Secure Vickrey auctions without threshold trust
-
[LAN02]. M. Blaze, editor, Proc. of 6th FC Conference. Springer
-
[LAN02] H. Lipmaa, N. Asokan, and V. Niemi. Secure Vickrey auctions without threshold trust. In M. Blaze, editor, Proc. of 6th FC Conference, volume 2357 of LNCS. Springer, 2002.
-
(2002)
LNCS
, vol.2357
-
-
Lipmaa, H.1
Asokan, N.2
Niemi, V.3
-
29
-
-
12344258539
-
Efficient signature generation by smart cards
-
[Sch91]
-
[Sch91] C. P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4(3):161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
30
-
-
84880914935
-
Market clearability
-
[SS01]
-
[SS01] T. Sandholm and S. Suri. Market clearability. In Proc. of 17th IJCAI, pages 1145-1151, 2001.
-
(2001)
Proc. of 17th IJCAI
, pp. 1145-1151
-
-
Sandholm, T.1
Suri, S.2
-
31
-
-
4544308241
-
Secure combinatorial auctions by dynamic programming with polynomial secret sharing
-
[SY02]. Proc. of 6th FC Conference. Springer
-
[SY02] K. Suzuki and M. Yokoo. Secure combinatorial auctions by dynamic programming with polynomial secret sharing. In Proc. of 6th FC Conference, volume 2357 of LNCS. Springer, 2002.
-
(2002)
LNCS
, vol.2357
-
-
Suzuki, K.1
Yokoo, M.2
-
32
-
-
35248879821
-
Secure generalized Vickrey auction using homomorphic encryption
-
[SY03]. Proc. of 7th FC Conference. Springer
-
[SY03] K. Suzuki and M. Yokoo. Secure generalized Vickrey auction using homomorphic encryption. In Proc. of 7th FC Conference, volume 2742 of LNCS, pages 239-249. Springer, 2003.
-
(2003)
LNCS
, vol.2742
, pp. 239-249
-
-
Suzuki, K.1
Yokoo, M.2
-
33
-
-
85090061108
-
Some tractable combinatorial auctions
-
[Ten00]. AAAI Press / The MIT Press
-
[Ten00] M. Tennenholtz. Some tractable combinatorial auctions. In Proc. of 17th AAAI Conference, pages 98-103. AAAI Press / The MIT Press, 2000.
-
(2000)
Proc. of 17th AAAI Conference
, pp. 98-103
-
-
Tennenholtz, M.1
-
34
-
-
84958979582
-
On the security of ElGamal-based encryption
-
[TY98]. Proc. of 1st International Workshop on Practice and Theory in Public Key Cryptography (PKC). Springer
-
[TY98] Y. Tsiounis and M. Yung. On the security of ElGamal-based encryption. In Proc. of 1st International Workshop on Practice and Theory in Public Key Cryptography (PKC), volume 1431 of LNCS, pages 117-134. Springer, 1998.
-
(1998)
LNCS
, vol.1431
, pp. 117-134
-
-
Tsiounis, Y.1
Yung, M.2
-
35
-
-
84980096808
-
Counter speculation, auctions, and competitive sealed tenders
-
[Vic61]
-
[Vic61] W. Vickrey. Counter speculation, auctions, and competitive sealed tenders. Journal of Finance, 16(1):8-37, 1961.
-
(1961)
Journal of Finance
, vol.16
, Issue.1
, pp. 8-37
-
-
Vickrey, W.1
-
36
-
-
0022882770
-
How to generate and exchange secrets
-
[Yao86]. IEEE Computer Society Press
-
[Yao86] A. C. Yao. How to generate and exchange secrets. In Proc. of 27th FOCS Symposium, pages 162-167. IEEE Computer Society Press, 1986.
-
(1986)
Proc. of 27th FOCS Symposium
, pp. 162-167
-
-
Yao, A.C.1
|