-
3
-
-
84860029058
-
-
EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2006-12, February 8 2006. [Online]
-
J. F. Canny and Y. Duan, "Practical private computation of vector addition-based functions or: Can privacy be for free?" EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2006-12, February 8 2006. [Online]. Available: http://www.eecs.berkeley.edu/Pubs/TechRpts/2006/EECS- 2006-12.html
-
Practical Private Computation of Vector Addition-based Functions Or: Can Privacy Be for Free?
-
-
Canny, J.F.1
Duan, Y.2
-
9
-
-
35048879624
-
A partition model of granular computing
-
Y. Y. Yao, "A partition model of granular computing," LNCS Transactions on Rough Sets, vol. 1, pp. 232-253, 2004.
-
(2004)
LNCS Transactions on Rough Sets
, vol.1
, pp. 232-253
-
-
Yao, Y.Y.1
-
11
-
-
0020312165
-
Protocols for secure computations
-
IEEE
-
A. C.-C. Yao, "Protocols for secure computations," in FOCS '82. IEEE, 1982, pp. 160-164.
-
(1982)
FOCS '82
, pp. 160-164
-
-
Yao, A.C.-C.1
-
12
-
-
0023545076
-
How to play any mental game -a completeness theorem for protocols with honest majority
-
O. Goldreich, S. Micali, and A. Wigderson, "How to play any mental game -a completeness theorem for protocols with honest majority," in Proceedings of the 19th ACM Symposium on the Theory of Computing (STOC), 1987, pp. 218-229.
-
(1987)
Proceedings of the 19th ACM Symposium on the Theory of Computing (STOC)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
13
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
ACM, May 2-4
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation," in Proceedings of the 20th Annual ACM Symposium on Theory of Computing, STOC'88. ACM, May 2-4 1988, pp. 1-10.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on Theory of Computing, STOC'88
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
14
-
-
0003839182
-
-
Working Draft, [Online]. Available: citeseer.nj.nec.com/ goldreich98secure.html
-
O. Goldreich, "Secure multi-party computation," Working Draft, 2000. [Online]. Available: citeseer.nj.nec.com/goldreich98secure.html
-
(2000)
Secure Multi-party Computation
-
-
Goldreich, O.1
-
15
-
-
85014508412
-
Multiparty computation with faulty majority
-
ser. Lecture Notes in Computer Science. Springer-Verlag
-
D. Beaver and S. Goldwasser, "Multiparty computation with faulty majority," in Proceedings of Advances in Cryptology - CRYPTO '89, ser. Lecture Notes in Computer Science, vol. 435. Springer-Verlag, 1989, p. 589.
-
(1989)
Proceedings of Advances in Cryptology - CRYPTO '89
, vol.435
, pp. 589
-
-
Beaver, D.1
Goldwasser, S.2
-
16
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
ser. Lecture Notes in Computer Science. Springer-Verlag
-
S. Goldwasser and L. Levin, "Fair computation of general functions in presence of immoral majority," in Advances in Cryptology - CRYPTO '90, ser. Lecture Notes in Computer Science, vol. 537. Springer-Verlag, 1991, pp. 77-93.
-
(1991)
Advances in Cryptology - CRYPTO '90
, vol.537
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
17
-
-
0036082701
-
Collaborative filtering with privacy
-
Oakland, CA, May. [Online]
-
J. Canny, "Collaborative filtering with privacy," in IEEE Symposium on Security and Privacy, Oakland, CA, May 2002, pp. 45-57. [Online]. Available: http://citeseer.nj.nec.com/canny02collaborative.html
-
(2002)
IEEE Symposium on Security and Privacy
, pp. 45-57
-
-
Canny, J.1
-
18
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
ser. Lecture Notes in Computer Science. Springer-Verlag
-
T. Pedersen, "Non-interactive and information-theoretic secure verifiable secret sharing," in Advances in Cryptology - CRYPTO '91, ser. Lecture Notes in Computer Science, vol. 576. Springer-Verlag, 1991, pp. 129-140.
-
(1991)
Advances in Cryptology - CRYPTO '91
, vol.576
, pp. 129-140
-
-
Pedersen, T.1
-
19
-
-
84957680703
-
Zero-knowledge proof for finite field arithmetic, or: Can zero-knowledge be for free?
-
ser. Lecture Notes in Computer Science. Springer-Verlag
-
R. Cramer and I. Damgård, "Zero-knowledge proof for finite field arithmetic, or: Can zero-knowledge be for free?" in CRYPTO '98, ser. Lecture Notes in Computer Science, vol. 1642. Springer-Verlag, 1998.
-
(1998)
CRYPTO '98
, vol.1642
-
-
Cramer, R.1
Damgård, I.2
-
21
-
-
0031628398
-
Simplified vss and fast-track multiparty computations with applications to threshold cryptography
-
ACM Press
-
R. Gennaro, M. O. Rabin, and T. Rabin, "Simplified vss and fast-track multiparty computations with applications to threshold cryptography," in PODC '98: Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing. ACM Press, 1998, pp. 101-111.
-
(1998)
PODC '98: Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing
, pp. 101-111
-
-
Gennaro, R.1
Rabin, M.O.2
Rabin, T.3
|