-
1
-
-
0002531104
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Widgerson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proc. of STOC, 1988.
-
(1988)
Proc. of STOC
-
-
Ben-Or, M.1
Goldwasser, S.2
Widgerson, A.3
-
2
-
-
0035879575
-
A fair and efficient solution to the socialist millionaires' problem
-
Fabirce Boudot, Berry Schoenmakers, and Jacques Traore. A fair and efficient solution to the socialist millionaires' problem. Discrete Applied Mathematics, 111:77-85, 2001.
-
(2001)
Discrete Applied Mathematics
, vol.111
, pp. 77-85
-
-
Boudot, F.1
Schoenmakers, B.2
Traore, J.3
-
3
-
-
24644493543
-
Proof systems for general statements about discrete logarithms
-
Dept. of Computer Science, ETH Zurich, Mar
-
Jan Camenisch. Proof systems for general statements about discrete logarithms. Technical Report 260, Dept. of Computer Science, ETH Zurich, Mar 1997.
-
(1997)
Technical Report
, vol.260
-
-
Camenisch, J.1
-
4
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24:84-8, 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
5
-
-
0346596020
-
Demonstrating possession of a discrete log without revealing it
-
A.M. Odlyzko, editor, Springer-Verlag
-
David Chaum, Jan-Hendrick Evertse, Jeroen van de Graaf, and Rene Peralta. Demonstrating possession of a discrete log without revealing it. In A.M. Odlyzko, editor, Proc. of Crypto, pages 200-212. Springer-Verlag, 1986.
-
(1986)
Proc. of Crypto
, pp. 200-212
-
-
Chaum, D.1
Evertse, J.-H.2
Van Graaf, J.D.3
Peralta, R.4
-
6
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
Springer-Verlag
-
R. Cramer, I. Damgård, and J. Buus Nielsen. Multiparty computation from threshold homomorphic encryption. In Proc. of Eurocrypt, pages 280-99. Springer-Verlag, 2001.
-
(2001)
Proc. of Eurocrypt
, pp. 280-299
-
-
Cramer, R.1
Damgård, I.2
Nielsen, J.B.3
-
7
-
-
0002626155
-
General secure multi-party computation from any linear secret sharing scheme
-
Springer-Verlag, May
-
Ronald Cramer, Ivan Damgård, and Ueli Maurer. General secure multi-party computation from any linear secret sharing scheme. In Proc. of Eurocrypt. Springer-Verlag, May 2000.
-
(2000)
Proc. of Eurocrypt
-
-
Cramer, R.1
Damgård, I.2
Maurer, U.3
-
8
-
-
84948958135
-
How to break a practical mix and design a new one
-
Springer-Verlag
-
Y. Desmedt and K. Kurosawa. How to break a practical mix and design a new one. In Proc. of Eurocrypt, pages 557-72. Springer-Verlag, 2000.
-
(2000)
Proc. of Eurocrypt
, pp. 557-572
-
-
Desmedt, Y.1
Kurosawa, K.2
-
11
-
-
33745129227
-
Threshold cryptosystems secure against chosen-ciphertext attacks
-
Pierre-Alain Fouque and David Pointcheval. Threshold cryptosystems secure against chosen-ciphertext attacks. In Proc. of Asiacrypt, pages 573-84, 2000.
-
(2000)
Proc. of Asiacrypt
, pp. 573-584
-
-
Fouque, P.-A.1
Pointcheval, D.2
-
12
-
-
35048820609
-
Efficient private matching and set intersection
-
volume LNCS 3027, Springer-Verlag, May
-
Michael Freedman, Kobi Nissim, and Benny Pinkas. Efficient private matching and set intersection. In Proc. of Eurocrypt, volume LNCS 3027, pages 1-19. Springer-Verlag, May 2004.
-
(2004)
Proc. of Eurocrypt
, pp. 1-19
-
-
Freedman, M.1
Nissim, K.2
Pinkas, B.3
-
13
-
-
84880857711
-
An efficient scheme for proving a shuffle
-
Springer-Verlag
-
J. Furukawa and K. Sako. An efficient scheme for proving a shuffle. In Proc. of Crypto, pages 368-87. Springer-Verlag, 2001.
-
(2001)
Proc. of Crypto
, pp. 368-387
-
-
Furukawa, J.1
Sako, K.2
-
14
-
-
1842599265
-
Securing threshold cryptosystems against chosen ciphertext attack
-
Rosario Gennaro and Victor Shoup. Securing threshold cryptosystems against chosen ciphertext attack. Journal of Cryptology, 15:75-96, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, pp. 75-96
-
-
Gennaro, R.1
Shoup, V.2
-
17
-
-
84957709438
-
A practical mix
-
Springer-Verlag
-
M. Jakobsson. A practical mix. In Proc. of Eurocrypt, pages 448-61. Springer-Verlag, 1998.
-
(1998)
Proc. of Eurocrypt
, pp. 448-461
-
-
Jakobsson, M.1
-
18
-
-
33745130929
-
Private and threshold set-intersection
-
Carnegie Mellon University, February
-
Lea Kissner and Dawn Song. Private and threshold set-intersection. Technical Report CMU-CS-05-113, Carnegie Mellon University, February 2005.
-
(2005)
Technical Report
, vol.CMU-CS-05-113
-
-
Kissner, L.1
Song, D.2
-
19
-
-
0345058962
-
Verifiable homomorphic oblivious transfer and private equality test
-
Helger Lipmaa. Verifiable homomorphic oblivious transfer and private equality test. In Proc. of Asiacrypt, pages 416-33, 2003.
-
(2003)
Proc. of Asiacrypt
, pp. 416-433
-
-
Lipmaa, H.1
-
22
-
-
0035754862
-
A verifiable secret shuffle and its application to e-voting
-
A. Neff. A verifiable secret shuffle and its application to e-voting. In ACM CCS, pages 116-25, 2001.
-
(2001)
ACM CCS
, pp. 116-125
-
-
Neff, A.1
-
23
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Proc. of Asiacrypt, pages 573-84, 2000.
-
(2000)
Proc. of Asiacrypt
, pp. 573-584
-
-
Paillier, P.1
-
25
-
-
0001772530
-
Protocols for secure computations
-
Andrew C-C Yao. Protocols for secure computations. In Proc. of FOCS, 1982.
-
(1982)
Proc. of FOCS
-
-
Yao, A.C.-C.1
|