메뉴 건너뛰기




Volumn 3621 LNCS, Issue , 2006, Pages 241-257

Privacy-preserving set operations

Author keywords

[No Author keywords available]

Indexed keywords

COMPOSABLE METHODS; FRAMEWORK; MULTISET OPERATIONS; PRIVACY-PRESERVING COMPUTATION;

EID: 33745160750     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (464)

References (25)
  • 1
    • 0002531104 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • M. Ben-Or, S. Goldwasser, and A. Widgerson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proc. of STOC, 1988.
    • (1988) Proc. of STOC
    • Ben-Or, M.1    Goldwasser, S.2    Widgerson, A.3
  • 2
    • 0035879575 scopus 로고    scopus 로고
    • A fair and efficient solution to the socialist millionaires' problem
    • Fabirce Boudot, Berry Schoenmakers, and Jacques Traore. A fair and efficient solution to the socialist millionaires' problem. Discrete Applied Mathematics, 111:77-85, 2001.
    • (2001) Discrete Applied Mathematics , vol.111 , pp. 77-85
    • Boudot, F.1    Schoenmakers, B.2    Traore, J.3
  • 3
    • 24644493543 scopus 로고    scopus 로고
    • Proof systems for general statements about discrete logarithms
    • Dept. of Computer Science, ETH Zurich, Mar
    • Jan Camenisch. Proof systems for general statements about discrete logarithms. Technical Report 260, Dept. of Computer Science, ETH Zurich, Mar 1997.
    • (1997) Technical Report , vol.260
    • Camenisch, J.1
  • 4
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24:84-8, 1981.
    • (1981) Communications of the ACM , vol.24 , pp. 84-88
    • Chaum, D.1
  • 5
    • 0346596020 scopus 로고
    • Demonstrating possession of a discrete log without revealing it
    • A.M. Odlyzko, editor, Springer-Verlag
    • David Chaum, Jan-Hendrick Evertse, Jeroen van de Graaf, and Rene Peralta. Demonstrating possession of a discrete log without revealing it. In A.M. Odlyzko, editor, Proc. of Crypto, pages 200-212. Springer-Verlag, 1986.
    • (1986) Proc. of Crypto , pp. 200-212
    • Chaum, D.1    Evertse, J.-H.2    Van Graaf, J.D.3    Peralta, R.4
  • 6
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty computation from threshold homomorphic encryption
    • Springer-Verlag
    • R. Cramer, I. Damgård, and J. Buus Nielsen. Multiparty computation from threshold homomorphic encryption. In Proc. of Eurocrypt, pages 280-99. Springer-Verlag, 2001.
    • (2001) Proc. of Eurocrypt , pp. 280-299
    • Cramer, R.1    Damgård, I.2    Nielsen, J.B.3
  • 7
    • 0002626155 scopus 로고    scopus 로고
    • General secure multi-party computation from any linear secret sharing scheme
    • Springer-Verlag, May
    • Ronald Cramer, Ivan Damgård, and Ueli Maurer. General secure multi-party computation from any linear secret sharing scheme. In Proc. of Eurocrypt. Springer-Verlag, May 2000.
    • (2000) Proc. of Eurocrypt
    • Cramer, R.1    Damgård, I.2    Maurer, U.3
  • 8
    • 84948958135 scopus 로고    scopus 로고
    • How to break a practical mix and design a new one
    • Springer-Verlag
    • Y. Desmedt and K. Kurosawa. How to break a practical mix and design a new one. In Proc. of Eurocrypt, pages 557-72. Springer-Verlag, 2000.
    • (2000) Proc. of Eurocrypt , pp. 557-572
    • Desmedt, Y.1    Kurosawa, K.2
  • 11
    • 33745129227 scopus 로고    scopus 로고
    • Threshold cryptosystems secure against chosen-ciphertext attacks
    • Pierre-Alain Fouque and David Pointcheval. Threshold cryptosystems secure against chosen-ciphertext attacks. In Proc. of Asiacrypt, pages 573-84, 2000.
    • (2000) Proc. of Asiacrypt , pp. 573-584
    • Fouque, P.-A.1    Pointcheval, D.2
  • 12
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • volume LNCS 3027, Springer-Verlag, May
    • Michael Freedman, Kobi Nissim, and Benny Pinkas. Efficient private matching and set intersection. In Proc. of Eurocrypt, volume LNCS 3027, pages 1-19. Springer-Verlag, May 2004.
    • (2004) Proc. of Eurocrypt , pp. 1-19
    • Freedman, M.1    Nissim, K.2    Pinkas, B.3
  • 13
    • 84880857711 scopus 로고    scopus 로고
    • An efficient scheme for proving a shuffle
    • Springer-Verlag
    • J. Furukawa and K. Sako. An efficient scheme for proving a shuffle. In Proc. of Crypto, pages 368-87. Springer-Verlag, 2001.
    • (2001) Proc. of Crypto , pp. 368-387
    • Furukawa, J.1    Sako, K.2
  • 14
    • 1842599265 scopus 로고    scopus 로고
    • Securing threshold cryptosystems against chosen ciphertext attack
    • Rosario Gennaro and Victor Shoup. Securing threshold cryptosystems against chosen ciphertext attack. Journal of Cryptology, 15:75-96, 2002.
    • (2002) Journal of Cryptology , vol.15 , pp. 75-96
    • Gennaro, R.1    Shoup, V.2
  • 17
    • 84957709438 scopus 로고    scopus 로고
    • A practical mix
    • Springer-Verlag
    • M. Jakobsson. A practical mix. In Proc. of Eurocrypt, pages 448-61. Springer-Verlag, 1998.
    • (1998) Proc. of Eurocrypt , pp. 448-461
    • Jakobsson, M.1
  • 18
    • 33745130929 scopus 로고    scopus 로고
    • Private and threshold set-intersection
    • Carnegie Mellon University, February
    • Lea Kissner and Dawn Song. Private and threshold set-intersection. Technical Report CMU-CS-05-113, Carnegie Mellon University, February 2005.
    • (2005) Technical Report , vol.CMU-CS-05-113
    • Kissner, L.1    Song, D.2
  • 19
    • 0345058962 scopus 로고    scopus 로고
    • Verifiable homomorphic oblivious transfer and private equality test
    • Helger Lipmaa. Verifiable homomorphic oblivious transfer and private equality test. In Proc. of Asiacrypt, pages 416-33, 2003.
    • (2003) Proc. of Asiacrypt , pp. 416-433
    • Lipmaa, H.1
  • 22
    • 0035754862 scopus 로고    scopus 로고
    • A verifiable secret shuffle and its application to e-voting
    • A. Neff. A verifiable secret shuffle and its application to e-voting. In ACM CCS, pages 116-25, 2001.
    • (2001) ACM CCS , pp. 116-125
    • Neff, A.1
  • 23
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Proc. of Asiacrypt, pages 573-84, 2000.
    • (2000) Proc. of Asiacrypt , pp. 573-584
    • Paillier, P.1
  • 25
    • 0001772530 scopus 로고
    • Protocols for secure computations
    • Andrew C-C Yao. Protocols for secure computations. In Proc. of FOCS, 1982.
    • (1982) Proc. of FOCS
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.