-
1
-
-
84937431456
-
Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
-
[ACS02]. Proc. of 22th CRYPTO Conference, Springer
-
[ACS02] J. Algesheimer, J. Camenisch, and V. Shoup. Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. In Proc. of 22th CRYPTO Conference, volume 2442 of LNCS, pages 417-432. Springer, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 417-432
-
-
Algesheimer, J.1
Camenisch, J.2
Shoup, V.3
-
2
-
-
35048875418
-
Secure computation of the kth-ranked element
-
[AMP04]. Proc. of 21st Eurocrypt Conference, Springer
-
[AMP04] G. Aggarwal, N. Mishra, and B. Pinkas. Secure computation of the kth-ranked element. In Proc. of 21st Eurocrypt Conference, volume 3027 of LNCS, pages 40-55. Springer, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 40-55
-
-
Aggarwal, G.1
Mishra, N.2
Pinkas, B.3
-
3
-
-
84958639277
-
Efficient generation of shared RSA keys
-
[BF97]. In Proc. of 17th CRYPTO Conference, Springer
-
[BF97] D. Boneh and M. Franklin. Efficient generation of shared RSA keys. In Proc. of 17th CRYPTO Conference, volume 1294 of LNCS, pages 425-439. Springer, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 425-439
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
84979502594
-
Security with low communication overhead
-
[BFKR90]. LNCS, Springer
-
[BFKR90] D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Security with low communication overhead. In Proc. of 10th CRYPTO Conference, number 537 in LNCS, pages 62-76. Springer, 1990.
-
(1990)
Proc. of 10th CRYPTO Conference
, vol.537
, pp. 62-76
-
-
Beaver, D.1
Feigenbaum, J.2
Kilian, J.3
Rogaway, P.4
-
5
-
-
24144433396
-
Evaluating 2-DNF formulas on cipher-texts
-
[BGN05]. Proc. of 2nd Theory of Cryptography Conference (TCC), Springer
-
[BGN05] D. Boneh, E. Goh, and K. Nissim. Evaluating 2-DNF formulas on cipher-texts. In Proc. of 2nd Theory of Cryptography Conference (TCC), volume 3378 of LNCS, pages 325-341. Springer, 2005.
-
(2005)
LNCS
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.2
Nissim, K.3
-
6
-
-
0025137207
-
The round complexity of secure protocols
-
[BMR90]. ACM Press
-
[BMR90] D. Beaver, S. Micali, and P. Rogaway. The round complexity of secure protocols. In Proc. of 22nd STOC, pages 503-513. ACM Press, 1990.
-
(1990)
Proc. of 22nd STOC
, pp. 503-513
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
7
-
-
0035879575
-
A fair and efficient solution to the socialist millionaires' problem
-
[BST01]
-
[BST01] F. Boudot, B. Schoenmakers, and J. Traoré. A fair and efficient solution to the socialist millionaires' problem. Discrete Applied Mathematics, 111(1-2):23-36, 2001.
-
(2001)
Discrete Applied Mathematics
, vol.111
, Issue.1-2
, pp. 23-36
-
-
Boudot, F.1
Schoenmakers, B.2
Traoré, J.3
-
8
-
-
84969520105
-
Optimistic fair secure computation
-
[CC00]. Proc. of 20th CRYPTO Conference, Springer
-
[CC00] C. Cachin and J. Camenisch. Optimistic fair secure computation. In Proc. of 20th CRYPTO Conference, volume 1880 of LNCS, pages 93-111. Springer, 2000.
-
(2000)
LNCS
, vol.1880
, pp. 93-111
-
-
Cachin, C.1
Camenisch, J.2
-
9
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
[CDN01]. Proc. of 18th Eurocrypt Conference, Springer
-
[CDN01] R. Cramer, I. Damgård, and J. B. Nielsen. Multiparty computation from threshold homomorphic encryption. In Proc. of 18th Eurocrypt Conference, volume 2045 of LNCS, pages 280-300. Springer, 2001.
-
(2001)
LNCS
, vol.2045
, pp. 280-300
-
-
Cramer, R.1
Damgård, I.2
Nielsen, J.B.3
-
10
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
[CDS94]. Proc. of 14th CRYPTO Conference, Springer
-
[CDS94] R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Proc. of 14th CRYPTO Conference, volume 893 of LNCS, pages 174-187. Springer, 1994.
-
(1994)
LNCS
, vol.893
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
11
-
-
84957375076
-
A secure and optimally efficient multi-authority election scheme
-
[CGS97]. Proc. of 14th Eurocrypt Conference, Springer
-
[CGS97] R. Cramer, R. Gennaro, and B. Schoenmakers. A secure and optimally efficient multi-authority election scheme. In Proc. of 14th Eurocrypt Conference, volume 1233 of LNCS, pages 103-118. Springer, 1997.
-
(1997)
LNCS
, vol.1233
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
12
-
-
0002187137
-
Wallet databases with observers
-
[CP92]. Proc. of 12th CRYPTO Conference, Springer
-
[CP92] D. Chaum and T. P. Pedersen. Wallet databases with observers. In Proc. of 12th CRYPTO Conference, volume 740 of LNCS, pages 3.1-3.6. Springer, 1992.
-
(1992)
LNCS
, vol.740
-
-
Chaum, D.1
Pedersen, T.P.2
-
13
-
-
84864794192
-
On ∑-protocols
-
[Dam02], University of Aarhus, Department for Computer Science
-
[Dam02] I. Damgård. On ∑-protocols. Lecture Notes, University of Aarhus, Department for Computer Science, 2002.
-
(2002)
Lecture Notes
-
-
Damgård, I.1
-
14
-
-
84880875026
-
Robust non-interactive zero knowledge
-
[DDO+01]. Proc. of 21th CRYPTO Conference, Springer
-
[DDO+01] A. De Santis, G. Di Crescenzo, R. Ostrovsky, G. Persiano, and A. Sahai. Robust non-interactive zero knowledge. In Proc. of 21th CRYPTO Conference, volume 2139 of LNCS, pages 566-598. Springer, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 566-598
-
-
De Santis, A.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
Sahai, A.5
-
15
-
-
84945127249
-
Practical threshold RSA signatures without a trusted dealer
-
[DK01]. Proc. of 18th Eurocrypt Conference, Springer
-
[DK01] I. Damgård and M. Koprowski. Practical threshold RSA signatures without a trusted dealer. In Proc. of 18th Eurocrypt Conference, volume 2045 of LNCS, pages 152-165. Springer, 2001.
-
(2001)
LNCS
, vol.2045
, pp. 152-165
-
-
Damgård, I.1
Koprowski, M.2
-
16
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
[El 85]
-
[El 85] T. El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31:469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
El Gamal, T.1
-
17
-
-
84937542853
-
A cost-effective pay-per-multiplication comparison method for millionaires
-
[Fis01]. Proceedings of the Cryptographers' Track at the 10th RSA Conference
-
[Fis01] M. Fischlin. A cost-effective pay-per-multiplication comparison method for millionaires. In Proceedings of the Cryptographers' Track at the 10th RSA Conference, volume 2020 of LNCS, pages 457-472, 2001.
-
(2001)
LNCS
, vol.2020
, pp. 457-472
-
-
Fischlin, M.1
-
18
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
[FS87]. LNCS, Springer
-
[FS87] A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Proc. of 12th CRYPTO Conference, LNCS, pages 186-194. Springer, 1987.
-
(1987)
Proc. of 12th CRYPTO Conference
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
19
-
-
84957104180
-
Two party RSA key generation
-
[Gil99]. Proc. of 19th CRYPTO Conference, Springer
-
[Gil99] N. Gilboa. Two party RSA key generation. In Proc. of 19th CRYPTO Conference, volume 1666 of LNCS, pages 116-129. Springer, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 116-129
-
-
Gilboa, N.1
-
20
-
-
49049089688
-
Secure distributed key generation for discrete-log based cryptosystems
-
[GJKR99]. Proc. of 16th Eurocrypt Conference, Springer
-
[GJKR99] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Secure distributed key generation for discrete-log based cryptosystems. In Proc. of 16th Eurocrypt Conference, volume 1592 of LNCS, pages 295-310. Springer, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 295-310
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
21
-
-
23944448377
-
Applications of Pedersen's distributed key generation protocol
-
[GJKR03]. Proc. of Cryptographers' Track at the 12th RSA Conference, Springer
-
[GJKR03] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Applications of Pedersen's distributed key generation protocol. In Proc. of Cryptographers' Track at the 12th RSA Conference, volume 2612 of LNCS, pages 373-390. Springer, 2003.
-
(2003)
LNCS
, vol.2612
, pp. 373-390
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
22
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
[GMW87]. ACM Press
-
[GMW87] O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In Proc. of 19th STOC, pages 218-229. ACM Press, 1987.
-
(1987)
Proc. of 19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
24
-
-
35248822599
-
A verifiable secret shuffle of homomorphic encryptions
-
[Gro03]. Proc. of 6th PKC Conference
-
[Gro03] J. Groth. A verifiable secret shuffle of homomorphic encryptions. In Proc. of 6th PKC Conference, volume 2567 of LNCS, pages 145-160, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 145-160
-
-
Groth, J.1
-
26
-
-
0034507841
-
Randomizing polynomials: A new representation with applications to round-efficient secure computation
-
[IK00]. IEEE Press
-
[IK00] Y. Ishai and E. Kushilevitz. Randomizing polynomials: A new representation with applications to round-efficient secure computation. In Proc. of 41st FOCS Symposium, pages 294-304. IEEE Press, 2000.
-
(2000)
Proc. of 41st FOCS Symposium
, pp. 294-304
-
-
Ishai, Y.1
Kushilevitz, E.2
-
27
-
-
84937417083
-
Mix and match: Secure function evaluation via ciphertexts
-
[JJ00]. Proc. of 6th Asiacrypt Conference, Springer
-
[JJ00] M. Jakobsson and A. Juels. Mix and match: Secure function evaluation via ciphertexts. In Proc. of 6th Asiacrypt Conference, volume 1976 of LNCS, pages 162-177. Springer, 2000.
-
(2000)
LNCS
, vol.1976
, pp. 162-177
-
-
Jakobsson, M.1
Juels, A.2
-
28
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
[Kil88]. ACM Press
-
[Kil88] J. Kilian. Founding cryptography on oblivious transfer. In Proc. of 20th ACM STOC, pages 20-31. ACM Press, 1988.
-
(1988)
Proc. of 20th ACM STOC
, pp. 20-31
-
-
Kilian, J.1
-
29
-
-
84957041593
-
Bit-slice auction circuit
-
[KO02]. Proc. of 7th European Symposium on Research in Computer Security (ESORICS), Springer
-
[KO02] K. Kurosawa and W. Ogata. Bit-slice auction circuit. In Proc. of 7th European Symposium on Research in Computer Security (ESORICS), volume 2502 of LNCS, pages 24-38. Springer, 2002.
-
(2002)
LNCS
, vol.2502
, pp. 24-38
-
-
Kurosawa, K.1
Ogata, W.2
-
30
-
-
35048833033
-
Parallel coin-tossing and constant-round secure two-party computation
-
[Lin01]. Proc. of 21st CRYPTO Conference, Springer
-
[Lin01] Y. Lindell. Parallel coin-tossing and constant-round secure two-party computation. In Proc. of 21st CRYPTO Conference, volume 2139 of LNCS, pages 171-189. Springer, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 171-189
-
-
Lindell, Y.1
-
31
-
-
26444581774
-
An efficient solution to the millionaires' problem based on homomorphic encryption
-
[LT05]. Proc. of 3rd International Conference on Applied Cryptography and Network Security (ACNS)
-
[LT05] H.-Y. Lin and W.-G. Tzeng. An efficient solution to the Millionaires' Problem based on homomorphic encryption. In Proc. of 3rd International Conference on Applied Cryptography and Network Security (ACNS), volume 3531 of LNCS, pages 456-466, 2005.
-
(2005)
LNCS
, vol.3531
, pp. 456-466
-
-
Lin, H.-Y.1
Tzeng, W.-G.2
-
32
-
-
0034819509
-
Communication preserving protocols for secure function evaluation
-
[NN01]. ACM Press
-
[NN01] M. Naor and K. Nissim. Communication preserving protocols for secure function evaluation. In Proc. of 33rd STOC, pages 590-599. ACM Press, 2001.
-
(2001)
Proc. of 33rd STOC
, pp. 590-599
-
-
Naor, M.1
Nissim, K.2
-
34
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
[Pai99]. Proc. of 16th Eurocrypt Conference, Springer
-
[Pai99] P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Proc. of 16th Eurocrypt Conference, volume 1592 of LNCS, pages 223-238. Springer, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
35
-
-
24944554813
-
An efficient and verifiable solution to the millionaire problem
-
[PBDL04]. Proc. of 7th International Conference on Information Security and Cryptology (ICISC), Springer
-
[PBDL04] K. Peng, C. Boyd, E. Dawson, and B. Lee. An efficient and verifiable solution to the millionaire problem. In Proc. of 7th International Conference on Information Security and Cryptology (ICISC), volume 3506 of LNCS, pages 51-66. Springer, 2004.
-
(2004)
LNCS
, vol.3506
, pp. 51-66
-
-
Peng, K.1
Boyd, C.2
Dawson, E.3
Lee, B.4
-
36
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
[Ped91]. J. Feigenbaum, editor, Proc. of 11th CRYPTO Conference, Springer
-
[Ped91] T. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In J. Feigenbaum, editor, Proc. of 11th CRYPTO Conference, volume 576 of LNCS, pages 129-140. Springer, 1991.
-
(1991)
LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.1
-
37
-
-
12344258539
-
Efficient signature generation by smart cards
-
[Sch91]
-
[Sch91] C. P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4(3):161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
38
-
-
0003855464
-
-
[Sch96] John Wiley and Sons, Inc., 2nd edition
-
[Sch96] B. Schneier. Applied Cryptography. John Wiley and Sons, Inc., 2nd edition, 1996.
-
(1996)
Applied Cryptography
-
-
Schneier, B.1
-
39
-
-
35048828873
-
Practical two-party computation based on the conditional gate
-
[ST04] LNCS, Springer
-
[ST04] B. Schoenmakers and P. Tuyls. Practical two-party computation based on the conditional gate. In Proc. of 10th Asiacrypt Conference, number 3329 in LNCS, pages 119-136. Springer, 2004.
-
(2004)
Proc. of 10th Asiacrypt Conference
, vol.3329
, pp. 119-136
-
-
Schoenmakers, B.1
Tuyls, P.2
-
40
-
-
84958979582
-
On the security of ElGamal-based encryption
-
[TY98]. In Proc. of 1st International Workshop on Practice and Theory in Public Key Cryptography (PKC), Springer
-
[TY98] Y. Tsiounis and M. Yung. On the security of ElGamal-based encryption. In Proc. of 1st International Workshop on Practice and Theory in Public Key Cryptography (PKC), volume 1431 of LNCS, pages 117-134. Springer, 1998.
-
(1998)
LNCS
, vol.1431
, pp. 117-134
-
-
Tsiounis, Y.1
Yung, M.2
-
41
-
-
0020312165
-
Protocols for secure computation
-
[Yao82]. IEEE Computer Society Press
-
[Yao82] A. C. Yao. Protocols for secure computation. In Proc. of 23th FOCS Symposium, pages 160-164. IEEE Computer Society Press, 1982.
-
(1982)
Proc. of 23th FOCS Symposium
, pp. 160-164
-
-
Yao, A.C.1
-
42
-
-
0022882770
-
How to generate and exchange secrets
-
[Yao86]. IEEE Computer Society Press
-
[Yao86] A. C. Yao. How to generate and exchange secrets. In Proc. of 27th FOCS Symposium, pages 162-167. IEEE Computer Society Press, 1986.
-
(1986)
Proc. of 27th FOCS Symposium
, pp. 162-167
-
-
Yao, A.C.1
|