-
1
-
-
84983104598
-
On defining proofs of knowledge
-
Mihir Bellare and Oded Goldreich, On Defining Proofs of Knowledge, CRYPTO 1992: 390-420.
-
Crypto 1992
, pp. 390-420
-
-
Bellare, M.1
Goldreich, O.2
-
2
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
Jan Camenisch, Victor Shoup, Practical Verifiable Encryption and Decryption of Discrete Logarithms, CRYPTO 2003: 126-144
-
Crypto 2003
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
3
-
-
84880897758
-
Universally composable commitments
-
Ran Canetti and Marc Fischlin,Universally Composable Commitments, CRYPTO 2001: 19-40
-
Crypto 2001
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
4
-
-
85023982750
-
An improved protocol for demonstrating possession of discrete logarithms and some generalizations
-
David Chaum, Jan-Hendrik Evertse and Jeroen van de Graaf, An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations, EUROCRYPT 1987: 127-141.
-
Eurocrypt 1987
, pp. 127-141
-
-
Chaum, D.1
Evertse, J.-H.2
Van Graaf, J.D.3
-
6
-
-
84957680703
-
Zero-knowledge proofs for finite field arithmetic; or: Can zero-knowledge be for free?
-
Ronald Cramer and Ivan Damgard Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free?, CRYPTO 1998: 424-441.
-
Crypto 1998
, pp. 424-441
-
-
Cramer, R.1
Damgard, I.2
-
7
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Ronald Cramer, Ivan Damgard, Berry Schoenmakers, Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols, CRYPTO 1994: 174-187
-
Crypto 1994
, pp. 174-187
-
-
Cramer, R.1
Damgard, I.2
Schoenmakers, B.3
-
8
-
-
84957375076
-
A secure and optimally efficient multi-authority election scheme
-
Ronald Cramer, Rosario Gennaro and Berry Schoenmakers, A Secure and Optimally Efficient Multi-Authority Election Scheme, EUROCRYPT 1997, pp. 103-118.
-
Eurocrypt 1997
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
9
-
-
84948970500
-
Efficient concurrent zero-knowledge in the auxiliary string model
-
Ivan Damgard, Efficient Concurrent Zero-Knowledge in the Auxiliary String Model EUROCRYPT 2000: 418-430.
-
Eurocrypt 2000
, pp. 418-430
-
-
Damgard, I.1
-
10
-
-
84937437506
-
Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor
-
Ivan Damgard, Jesper Buus Nielsen, Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor, CRYPTO 2002. pp. 581-596.
-
Crypto 2002
, pp. 581-596
-
-
Damgard, I.1
Nielsen, J.B.2
-
12
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
July
-
T. ElGamal. A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, IT-31(4):469-472, July 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
13
-
-
27544478009
-
Advances in frequent itemset mining implementations: Introduction to FIMI03
-
FIMI '03, Frequent Itemset Mining Implementations, 19 December, Melbourne, Florida, USA
-
Bart Goethals and Mohammed Javeed Zaki, Advances in Frequent Itemset Mining Implementations: Introduction to FIMI03, FIMI '03, Frequent Itemset Mining Implementations, Proceedings of the ICDM 2003 Workshop on Frequent Itemset Mining Implementations, 19 December 2003, Melbourne, Florida, USA.
-
(2003)
Proceedings of the ICDM 2003 Workshop on Frequent Itemset Mining Implementations
-
-
Goethals, B.1
Zaki, M.J.2
-
14
-
-
33745160750
-
Privacy-preserving set operations
-
Lea Kissner AND Dawn Xiaodong Song, Privacy-Preserving Set Operations, CRYPTO 2005, pp. 241-257.
-
Crypto 2005
, pp. 241-257
-
-
Kissner, L.1
Song, D.X.2
-
15
-
-
33646728872
-
Private itemset support counting
-
ICICS '05
-
Sven Laur, Helger Lipmaa and Taneli Mielikainen Private Itemset Support Counting, ICICS '05, Vol. 3783 LNCS, pages 97-111, 2005
-
(2005)
LNCS
, vol.3783
, pp. 97-111
-
-
Laur, S.1
Lipmaa, H.2
Mielikainen, T.3
-
16
-
-
0030150177
-
Comparing information without leaking it
-
Ronald Fagin, Moni Naor, and Peter Winkler. Comparing information without leaking it. Communications of the ACM, 39(5):77-85, 1996.
-
(1996)
Communications of the ACM
, vol.39
, Issue.5
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
18
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
Shafi Goldwasser, Silvio Micali and Charles Rackoff, The Knowledge Complexity of Interactive Proof Systems SIAM J. Comput. 18(1), pp. 186-208, 1989.
-
(1989)
SIAM J. Comput.
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
23
-
-
35048828873
-
Practical two-party computation based on the conditional gate
-
Berry Schoenmakers and Pim Tuyls, Practical Two-Party Computation Based on the Conditional Gate, ASIACRYPT 2004, pp. 119-136.
-
ASIACRYPT 2004
, pp. 119-136
-
-
Schoenmakers, B.1
Tuyls, P.2
-
24
-
-
0022882770
-
How to generate and exchange secrets
-
A. C. Yao, How to generate and exchange secrets, In Proceedings of the 27th FOCS, pages 162-167, 1986.
-
(1986)
Proceedings of the 27th FOCS
, pp. 162-167
-
-
Yao, A.C.1
|