-
1
-
-
84937431456
-
Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
-
(Berlin), M. Yung, Ed., Springer-Verlag
-
ALGESHEIMER, J., CAMENISCH, J., AND SHOUP, V. Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. In Advances in Cryptology - CRYPTO 2002 (Berlin, 2002), M. Yung, Ed., Springer-Verlag, pp. 417-432.
-
(2002)
Advances in Cryptology - CRYPTO 2002
, pp. 417-432
-
-
Algesheimer, J.1
Camenisch, J.2
Shoup, V.3
-
2
-
-
84941163009
-
-
BOGETOFT, P., AND NIELSEN, K. Work in progress. 2005
-
BOGETOFT, P., AND NIELSEN, K. Work in progress. 2005.
-
-
-
-
3
-
-
84937394850
-
Cryptographic protocols for secure second-price auctions
-
154-
-
BRANDT, F. Cryptographic protocols for secure second-price auctions. Lecture Notes in Computer Science 2182 (2001), 154-
-
(2001)
Lecture Notes in Computer Science
, vol.2182
-
-
Brandt, F.1
-
4
-
-
33750051746
-
Efficient privacy-preserving protocols for multiunit auctions
-
A. Patrick and M. Yung, Eds., Lecture Notes in Computer Science (LNCS), Springer
-
BRANDT, F., AND SANDHOLM, T. Efficient privacy-preserving protocols for multiunit auctions. In Proceedings of the 9th International Conference on Financial Cryptography and Data Security (FC) (2005), A. Patrick and M. Yung, Eds., Lecture Notes in Computer Science (LNCS), Springer.
-
(2005)
Proceedings of the 9th International Conference on Financial Cryptography and Data Security (FC)
-
-
Brandt, F.1
Sandholm, T.2
-
6
-
-
21144458613
-
Share conversion, pseudorandom secret-sharing and applications to secure computation
-
CRAMER, R., DAMGÅRD, I., AND ISHAI, Y. Share conversion, pseudorandom secret-sharing and applications to secure computation. In Proceedings of the Second Theory of Cryptography Conference (2005), pp. 342-362.
-
(2005)
Proceedings of the Second Theory of Cryptography Conference
, pp. 342-362
-
-
Cramer, R.1
Damgård, I.2
Ishai, Y.3
-
7
-
-
84941159989
-
-
DAMGÅRD, L, AND TOFT, T. Work in progress. 2005
-
DAMGÅRD, L, AND TOFT, T. Work in progress. 2005.
-
-
-
-
8
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
B. Pfitzmann, Ed.
-
DAMGÅRD, I. B., GRAMER, R., AND NIELSEN, J. B. Multiparty computation from threshold homomorphic encryption. In Advances in Cryptology - EuroCrypt 2001 Proceedings (2001), B. Pfitzmann, Ed., vol. 2045, pp. 280-300.
-
(2001)
Advances in Cryptology - EuroCrypt 2001 Proceedings
, vol.2045
, pp. 280-300
-
-
Damgård, I.B.1
Gramer, R.2
Nielsen, J.B.3
-
9
-
-
33749007039
-
Secure computation of surveys
-
FEIGENBAUM, J., PINKAS, B., RYGER, R. S., AND JAIN, F. S. Secure Computation of Surveys. In EU Workshop on Secure Multiparty Protocols (2004).
-
(2004)
EU Workshop on Secure Multiparty Protocols
-
-
Feigenbaum, J.1
Pinkas, B.2
Ryger, R.S.3
Jain, F.S.4
-
10
-
-
0029220609
-
The design and implementation of a secure auction service
-
(Oakland, Ca), IEEE Computer Society Press
-
FRANKLIN, M., AND REITER, M. The Design and Implementation of a Secure Auction Service. In Proc. IEEE Symp. on Security and Privacy (Oakland, Ca, 1995), IEEE Computer Society Press, pp. 2-14.
-
(1995)
Proc. IEEE Symp. on Security and Privacy
, pp. 2-14
-
-
Franklin, M.1
Reiter, M.2
-
11
-
-
33750064649
-
-
Master's thesis, Department of Computer Science, University of Aarhus. In preparation
-
FROM, S. L., AND JAKOBSEN, T. Secure Multi-Party Computation on Integers. Master's thesis, Department of Computer Science, University of Aarhus, 2006. In preparation.
-
(2006)
Secure Multi-party Computation on Integers
-
-
From, S.L.1
Jakobsen, T.2
-
12
-
-
0023545076
-
How to play any mental gamer or a completeness theorem for protocols with honest majority
-
ACM
-
GOLDREICH, O., MICALI, S., AND WIGDERSON, A. How to play any mental gamer or a completeness theorem for protocols with honest majority. In 19th Symp. on Theory of Computing (STOC) (1987), ACM, pp. 218-229.
-
(1987)
19th Symp. on Theory of Computing (STOC)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
13
-
-
84941152710
-
How to split a shared secret into shared bits in constant-round
-
I.DAMGÅRD. N. ITZI, J.NIELSEN, AND T.TOFT. How to split a shared secret into shared bits in constant-round. The Eprint archive, nr. 2005/140 www.iacr.org (2005).
-
(2005)
The Eprint Archive, Nr. 2005/140
, vol.2005
, Issue.140
-
-
Damgård, I.1
Fitzi, N.2
Nielsen, J.3
Toft, T.4
-
14
-
-
0032804976
-
Auction theory: A guide to the literature
-
KLEMPERER, P. Auction theory: A guide to the literature. Journal of Economic Survey 13, 3 (1999), 227-286.
-
(1999)
Journal of Economic Survey
, vol.13
, Issue.3
, pp. 227-286
-
-
Klemperer, P.1
-
15
-
-
84957026937
-
Secure vickrey auctions without threshold trust
-
Financial Cryptography 2002
-
LIPMAA, H., ASOKAN, N., AND NIEMI, V. Secure vickrey auctions without threshold trust. In Financial Cryptography 2002 (2002), vol. 2357 of Lecture Notes in Computer Science.
-
(2002)
Lecture Notes in Computer Science
, vol.2357
-
-
Lipmaa, H.1
Asokan, N.2
Niemi, V.3
-
16
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
MALKHI, D., NISAN, N., PINKAS, B., AND SELLA, Y. Fairplay - A Secure Two-Party Computation System. In Proceedings of the 13th USENIX Security Symposium (2004), pp. 287-302.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
17
-
-
84883898504
-
Privacy preserving auctions and mechanism design
-
ACM
-
NAOR, M., PINKAS, B., AND SUMNER, R. Privacy preserving auctions and mechanism design. In 1st ACM Conf. on Electronic Commerce (1999), ACM, pp. 129-139.
-
(1999)
1st ACM Conf. on Electronic Commerce
, pp. 129-139
-
-
Naor, M.1
Pinkas, B.2
Sumner, R.3
-
18
-
-
21844488096
-
Optimal bidding in multi-unit auctions with many bidders
-
NAUTZ, D. Optimal bidding in multi-unit auctions with many bidders. Economics Letters 48 (1995), 301-306.
-
(1995)
Economics Letters
, vol.48
, pp. 301-306
-
-
Nautz, D.1
-
19
-
-
0018545449
-
How to share a secret
-
November
-
SHAMIR, A. How to share a secret. Communications of the ACM 22, 11 (November 1979), 612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
20
-
-
33750087380
-
Secure integer computation with application in economics
-
available from author, tomas@daimi.au.dk
-
T.TOFT. Secure integer computation with application in economics. Progress Report, available from author, tomas@daimi.au.dk (2005).
-
(2005)
Progress Report
-
-
Toft, T.1
|