메뉴 건너뛰기




Volumn 3876 LNCS, Issue , 2006, Pages 522-541

Communication efficient secure linear algebra

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION SYSTEMS; COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; LINEAR EQUATIONS; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 33745558215     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11681878_27     Document Type: Conference Paper
Times cited : (19)

References (18)
  • 1
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF Formulas on Ciphertexts
    • D. Boneh, E. Goh, and K. Nissim. Evaluating 2-DNF Formulas on Ciphertexts. TCC 2005 pages 325-341.
    • TCC 2005 , pp. 325-341
    • Boneh, D.1    Goh, E.2    Nissim, K.3
  • 2
    • 0034672929 scopus 로고    scopus 로고
    • Uniform generation of NP-witnesses using an NP-oracle
    • M. Bellare, O. Goldreich, and E. Petrank. Uniform Generation of NP-Witnesses Using an NP-Oracle. In Inf. Comput. 163(2): 510-526 (2000).
    • (2000) Inf. Comput. , vol.163 , Issue.2 , pp. 510-526
    • Bellare, M.1    Goldreich, O.2    Petrank, E.3
  • 3
    • 84943422766 scopus 로고    scopus 로고
    • Separating the power of monotone span programs over different fields
    • A. Beimel, and E. Weinreb. Separating the Power of Monotone Span Programs over Different Fields. In FOCS 2003: 428-437.
    • FOCS 2003 , pp. 428-437
    • Beimel, A.1    Weinreb, E.2
  • 5
    • 84880872502 scopus 로고    scopus 로고
    • Secure distributed linear algebra in a constant number of rounds
    • R. Cramer, and I. Damgård. Secure Distributed Linear Algebra in a Constant Number of Rounds. In CRYPTO 2001: 119-136.
    • CRYPTO 2001 , pp. 119-136
    • Cramer, R.1    Damgård, I.2
  • 7
    • 84867553981 scopus 로고    scopus 로고
    • A generalization, a simplification and some applications of Paillier's probabilistic public-key system
    • K. Kim, editor, Proceedings of Public Key Cryptography 2001, Springer
    • I. Damgård and M. Jurik. A generalization, a simplification and some applications of Paillier's probabilistic public-key system. In K. Kim, editor, Proceedings of Public Key Cryptography 2001, volume 1992 of LNCS, pages 119-136. Springer, 2001.
    • (2001) LNCS , vol.1992 , pp. 119-136
    • Damgård, I.1    Jurik, M.2
  • 8
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Jul
    • T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4):469-472, Jul 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 12
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Y. Lindell and B. Pinkas. Privacy Preserving Data Mining In J. Cryptology 15(3): 177-206, 2002.
    • (2002) J. Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 13
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • J. Stern, editor, Proceedings of Eurocrypt 1999, Springer-Verlag, May
    • P. Pallier. Public-key cryptosystems based on composite degree residuosity classes. In J. Stern, editor, Proceedings of Eurocrypt 1999, volume 1592 of LNCS, pages 223-238. Springer-Verlag, May 1999.
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Pallier, P.1
  • 14
    • 85030460443 scopus 로고
    • A threshold cryptosystem without a trusted party
    • D. Davies, editor, Proceedings of Eurocrypt 1991, Springer
    • T. P. Pedersen. A threshold cryptosystem without a trusted party. In D. Davies, editor, Proceedings of Eurocrypt 1991, volume 547 of LNCS, pages 522-526. Springer, 1991.
    • (1991) LNCS , vol.547 , pp. 522-526
    • Pedersen, T.P.1
  • 15
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptoSystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman. A Method for Obtaining Digital Signatures and Public-Key CryptoSystems. Commun. ACM 21(2): 120-126 (1978).
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.