-
1
-
-
84945134014
-
Priced oblivious transfer: How to sell digital goods
-
William Aiello, Yuval Ishai, and Omer Reingold. Priced oblivious transfer: How to sell digital goods. In Proc. EUROCRYPT 2001, pages 119-135, 2001.
-
(2001)
Proc. EUROCRYPT 2001
, pp. 119-135
-
-
Aiello, W.1
Ishai, Y.2
Reingold, O.3
-
2
-
-
35048846561
-
Strong conditional oblivious transfer and computing on intervals
-
Advances in Cryptology - ASIACRYPT 2004. Springer
-
Ian F. Blake and Vladimir Kolesnikov. Strong conditional oblivious transfer and computing on intervals. In Advances in Cryptology - ASIACRYPT 2004, volume 3329 of Lecture Notes in Computer Science, pages 515-529. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3329
, pp. 515-529
-
-
Blake, I.F.1
Kolesnikov, V.2
-
4
-
-
84957690041
-
Conditional oblivious transfer and time-released encryption
-
Springer-Verlag, 1999. Lecture Notes in Computer Science
-
G. Di Crescenzo, R. Ostrovsky, and S. Rajagopalan. Conditional oblivious transfer and time-released encryption. In Proc. CRYPTO 99, pages 74-89. Springer-Verlag, 1999. Lecture Notes in Computer Science, vol. 1592.
-
Proc. CRYPTO 99
, vol.1592
, pp. 74-89
-
-
Di Crescenzo, G.1
Ostrovsky, R.2
Rajagopalan, S.3
-
5
-
-
84944320484
-
Private selective payment protocols
-
Giovanni Di Crescenzo. Private selective payment protocols. In Financial Cryptography, pages 72-89, 2000.
-
(2000)
Financial Cryptography
, pp. 72-89
-
-
Di Crescenzo, G.1
-
6
-
-
84937542853
-
A cost-effective pay-per-multiplication comparison method for millionaires
-
Springer-Verlag. Lecture Notes in Computer Science
-
Marc Fischlin. A cost-effective pay-per-multiplication comparison method for millionaires. In RSA Security 2001 Cryptographer's Track, pages 457-471. Springer-Verlag, 2001. Lecture Notes in Computer Science, vol. 2020.
-
(2001)
RSA Security 2001 Cryptographer's Track
, vol.2020
, pp. 457-471
-
-
Fischlin, M.1
-
7
-
-
35048820609
-
Efficient private matching and set intersection
-
Springer-Verlag, 2004. Lecture Notes in Computer Science
-
Michael J. Freedman, Kobbi Nissim, and Benny Pinkas. Efficient private matching and set intersection. In Proc. EUROCRYPT 2004, pages 1-19. Springer-Verlag, 2004. Lecture Notes in Computer Science, vol. 3027.
-
Proc. EUROCRYPT 2004
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
8
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
New York, NY, USA. ACM Press
-
Yael Gertner, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. Protecting data privacy in private information retrieval schemes. In STOC '98: Proceedings of the thirtieth annual ACM symposium on Theory of computing, pages 151-160, New York, NY, USA, 1998. ACM Press.
-
(1998)
STOC '98: Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing
, pp. 151-160
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
9
-
-
24944523186
-
On private scalar product computation for privacy-preserving data mining
-
Choonsik Park and Seongtaek Chee, editors, December 2-3
-
Bart Goethals, Sven Laur, Helger Lipmaa, and Taneli Mielikäinen. On Private Scalar Product Computation for Privacy-Preserving Data Mining. In Choonsik Park and Seongtaek Chee, editors, The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004), volume 3506, pages 104-120, December 2-3, 2004.
-
(2004)
The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004)
, vol.3506
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikäinen, T.4
-
11
-
-
33646813314
-
Gate evaluation secret sharing and secure one-round two-party computation
-
Advances in Cryptology - ASIACRYPT 2005. Springer
-
Vladimir Kolesnikov. Gate evaluation secret sharing and secure one-round two-party computation. In Advances in Cryptology - ASIACRYPT 2005, volume 3788 of Lecture Notes in Computer Science, pages 136-155. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3788
, pp. 136-155
-
-
Kolesnikov, V.1
-
12
-
-
77954761667
-
Additive conditional disclosure of secrets and applications
-
Sven Laur and Helger Lipmaa. Additive conditional disclosure of secrets and applications. Cryptology ePrint Archive, Report 2005/378, 2005. http://eprint.iacr.org/.
-
(2005)
Cryptology EPrint Archive, Report
, vol.2005
, Issue.378
-
-
Laur, S.1
Lipmaa, H.2
-
13
-
-
0003625004
-
Privacy preserving data mining
-
Springer-Verlag. Lecture Notes in Computer Science
-
Yehuda Lindell and Benny Pinkas. Privacy preserving data mining. In Proc. CRYPTO 00, pages 20-24. Springer-Verlag, 2000. Lecture Notes in Computer Science, vol. 1880.
-
(2000)
Proc. CRYPTO 00
, vol.1880
, pp. 20-24
-
-
Lindell, Y.1
Pinkas, B.2
-
15
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Springer-Verlag. Lecture Notes in Computer Science
-
Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Proc. EUROCRYPT 99, pages 223-238. Springer-Verlag, 1999. Lecture Notes in Computer Science, vol. 1592.
-
(1999)
Proc. EUROCRYPT 99
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
16
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Harvard Aiken Computation Laboratory
-
M. Rabin. How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computation Laboratory, 1981.
-
(1981)
Technical Report
, vol.TR-81
-
-
Rabin, M.1
|