-
1
-
-
84957715741
-
Universally Verifiable mix-net with Verification Work Independent of the Number of Mix-centers
-
Eurocrypt '98
-
M. Abe, Universally Verifiable mix-net with Verification Work Independent of the Number of Mix-centers, Eurocrypt '98, pp. 437-447, LNCS 1403, 1998.
-
(1998)
LNCS
, vol.1403
, pp. 437-447
-
-
Abe, M.1
-
2
-
-
63449118333
-
Flaws in Some Robust Optimistic Mix-Nets
-
Proceedings of Information Security and Privacy, 8th Australasian Conference
-
M. Abe, Flaws in Some Robust Optimistic Mix-Nets, In Proceedings of Information Security and Privacy, 8th Australasian Conference, LNCS 2727, pp. 39-50, 2003.
-
(2003)
LNCS
, vol.2727
, pp. 39-50
-
-
Abe, M.1
-
3
-
-
85029542707
-
Foundations of secure interactive computation
-
Crypto '91
-
D. Beaver, Foundations of secure interactive computation, Crypto '91, LNCS 576, pp. 377-391, 1991.
-
(1991)
LNCS
, vol.576
, pp. 377-391
-
-
Beaver, D.1
-
4
-
-
84958626314
-
Towards realizing random oracles: Hash functions that hide all partial information
-
Crypto '97
-
R. Canetti, Towards realizing random oracles: Hash functions that hide all partial information, Crypto '97, LNCS 1294, pp. 455-469, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 455-469
-
-
Canetti, R.1
-
5
-
-
0000731055
-
Security and composition of multi-party cryptographic protocols
-
winter
-
R. Canetti, Security and composition of multi-party cryptographic protocols, Journal of Cryptology, Vol. 13, No. 1, winter 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
-
-
Canetti, R.1
-
7
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms
-
D. Chaum, Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms, Communications of the ACM - CACM '81, Vol. 24, No. 2, pp. 8-4-88, 1981.
-
(1981)
Communications of the ACM - CACM '81
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
8
-
-
0036038991
-
Universally Composable Two-Party and Multi-Party Secure Computation
-
R. Canetti, Y. Lindell, R. Ostrovsky, A. Sahai, Universally Composable Two-Party and Multi-Party Secure Computation, 34th STOC, pp. 494-503, 2002.
-
(2002)
34th STOC
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
9
-
-
84870707379
-
A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
-
Crypto '98
-
R. Cramer, V. Shoup, A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack, Crypto '98, pp. 13-25, LNCS 1462, 1998.
-
(1998)
LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
10
-
-
84948958135
-
How to break a practical MIX and design a new one
-
Eurocrypt 2000
-
Y. Desmedt, K. Kurosawa, How to break a practical MIX and design a new one, Eurocrypt 2000, pp. 557-572, LNCS 1807, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 557-572
-
-
Desmedt, Y.1
Kurosawa, K.2
-
11
-
-
85028450627
-
Non-Malleable Cryptography
-
D. Dolev, C. Dwork, M. Naor, Non-Malleable Cryptography, 23rd STOC, pp. 542-552, 1991.
-
(1991)
23rd STOC
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
12
-
-
84874800178
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
T. El Gamal, A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
El Gamal, T.1
-
13
-
-
0023538330
-
A practical scheme for non-interactive verifiable secret sharing
-
P. Feldman, A practical scheme for non-interactive verifiable secret sharing, In Proceedings of the 28th FOCS, pages 427-438, 1987.
-
(1987)
Proceedings of the 28th FOCS
, pp. 427-438
-
-
Feldman, P.1
-
14
-
-
77954124943
-
A practical secret voting scheme for large scale elections
-
Auscrypt '92
-
A. Fujioka, T. Okamoto and K. Ohta, A practical secret voting scheme for large scale elections, Auscrypt '92, LNCS 718, pp. 244-251, 1992.
-
(1992)
LNCS
, vol.718
, pp. 244-251
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
15
-
-
84880857711
-
An efficient scheme for proving a shuffle
-
Crypto 2001
-
J. Furukawa, K. Sako, An efficient scheme for proving a shuffle, Crypto 2001, LNCS 2139, pp. 368-387, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 368-387
-
-
Furukawa, J.1
Sako, K.2
-
16
-
-
24144447518
-
An implementation of a universally verifiable electronic voting scheme based on shuffling
-
J. Furukawa, H. Miyauchi, K. Mori, S. Obana, K. Sako, An implementation of a universally verifiable electronic voting scheme based on shuffling, Financial Cryptography '02, 2002.
-
(2002)
Financial Cryptography '02
-
-
Furukawa, J.1
Miyauchi, H.2
Mori, K.3
Obana, S.4
Sako, K.5
-
17
-
-
49049089688
-
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
-
Eurocrypt '99
-
R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin, Secure Distributed Key Generation for Discrete-Log Based Cryptosystems, Eurocrypt '99, LNCS 1592, pp. 295-310, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 295-310
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
18
-
-
0023545076
-
How to Play Any Mental Game
-
O. Goldreich, S. Micali, and A. Wigderson, How to Play Any Mental Game, 19th STOC, pp. 218-229, 1987.
-
(1987)
19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
19
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
Crypto '90
-
S. Goldwasser, L. Levin, Fair computation of general functions in presence of immoral majority, Crypto '90, LNCS 537, pp. 77-93, 1990.
-
(1990)
LNCS
, vol.537
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
20
-
-
84947284060
-
Secure Multi-Party Computation Without Agreement
-
Proceedings of the 16th DISC
-
S. Goldwasser, Y. Lindell, Secure Multi-Party Computation Without Agreement, In Proceedings of the 16th DISC, LNCS 2508, pp. 17-32, 2002.
-
(2002)
LNCS
, vol.2508
, pp. 17-32
-
-
Goldwasser, S.1
Lindell, Y.2
-
21
-
-
0021409284
-
Probabilistic Encryption
-
S. Goldwasser, S. Micali, Probabilistic Encryption, Journal of Computer and System Sciences (JCSS), Vol. 28, No. 2, pp. 270-299, 1984.
-
(1984)
Journal of Computer and System Sciences (JCSS)
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
22
-
-
84958742387
-
Optimistic Mixing for Exit-Polls
-
Asiacrypt 2002
-
P. Golle, S. Zhong, D. Boneh, M. Jakobsson, A. Juels, Optimistic Mixing for Exit-Polls, Asiacrypt 2002, LNCS, 2002.
-
(2002)
LNCS
-
-
Golle, P.1
Zhong, S.2
Boneh, D.3
Jakobsson, M.4
Juels, A.5
-
23
-
-
35248822599
-
A Verifiable Secret Shuffle of Homomorphic Encryptions
-
PKC 2003
-
N. Groth, A Verifiable Secret Shuffle of Homomorphic Encryptions, PKC 2003, pp. 145-160, LNCS 2567, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 145-160
-
-
Groth, N.1
-
24
-
-
84957709438
-
A Practical Mix
-
Eurocrypt '98
-
M. Jakobsson, A Practical Mix, Eurocrypt '98, LNCS 1403, pp. 448-461, 1998.
-
(1998)
LNCS
, vol.1403
, pp. 448-461
-
-
Jakobsson, M.1
-
28
-
-
0036038649
-
On the Composition of Authenticated Byzantine Agreement
-
Y. Lindell, A. Lysyanskaya, T. Rabin, On the Composition of Authenticated Byzantine Agreement, 34th STOC, pp. 514-523, 2002.
-
(2002)
34th STOC
, pp. 514-523
-
-
Lindell, Y.1
Lysyanskaya, A.2
Rabin, T.3
-
29
-
-
0023985474
-
The notion of security for probabilistic cryptosystems
-
S. Micali, C. Rackoff, B. Sloan, The notion of security for probabilistic cryptosystems, SIAM Journal of Computing, Vol. 17, No. 2, pp. 412-426, 1988.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 412-426
-
-
Micali, S.1
Rackoff, C.2
Sloan, B.3
-
30
-
-
84974655726
-
Secure Computation
-
Crypto '91
-
S. Micali, P. Rogaway, Secure Computation, Crypto '91, LNCS 576, pp. 392-404, 1991.
-
(1991)
LNCS
, vol.576
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
31
-
-
84955592437
-
Some remarks on a reciept-free and universally verifiable Mix-type voting scheme
-
Asiacrypt '96
-
M. Michels, P. Horster, Some remarks on a reciept-free and universally verifiable Mix-type voting scheme, Asiacrypt '96, pp. 125-132, LNCS 1163, 1996.
-
LNCS
, vol.1163
, Issue.1996
, pp. 125-132
-
-
Michels, M.1
Horster, P.2
-
32
-
-
69549094995
-
Attack for Flash MIX
-
Asiacrypt 2000
-
M. Mitomo, K. Kurosawa, Attack for Flash MIX, Asiacrypt 2000, pp. 192-204, LNCS 1976, 2000.
-
(2000)
LNCS
, vol.1976
, pp. 192-204
-
-
Mitomo, M.1
Kurosawa, K.2
-
34
-
-
35048853920
-
-
Personal communication
-
A. Neff, Personal communication, 2003.
-
(2003)
-
-
Neff, A.1
-
35
-
-
84955613970
-
How to prevent buying of votes in computer elections
-
Asiacrypt'94
-
V. Niemi, A. Renvall, How to prevent buying of votes in computer elections, Asiacrypt'94, LNCS 917, pp. 164-170, 1994.
-
(1994)
LNCS
, vol.917
, pp. 164-170
-
-
Niemi, V.1
Renvall, A.2
-
36
-
-
0002986502
-
Fault Tolerant Anonymous Channel
-
Information and Communications Security - ICICS '97
-
W. Ogata, K. Kurosawa, K. Sako, K. Takatani, Fault Tolerant Anonymous Channel, Information and Communications Security - ICICS '97, pp. 440-444, LNCS 1334, 1997.
-
LNCS
, vol.1334
, Issue.1997
, pp. 440-444
-
-
Ogata, W.1
Kurosawa, K.2
Sako, K.3
Takatani, K.4
-
37
-
-
85027158725
-
Efficient Anonymous Channel and All/Nothing Election Scheme
-
Eurocrypt '93
-
C. Park, K. Itoh, K. Kurosawa, Efficient Anonymous Channel and All/Nothing Election Scheme, Eurocrypt '93, LNCS 765, pp. 248-259, 1994.
-
(1994)
LNCS
, vol.765
, pp. 248-259
-
-
Park, C.1
Itoh, K.2
Kurosawa, K.3
-
38
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
Eurocrypt '91
-
T. Pedersen, A threshold cryptosystem without a trusted party, Eurocrypt '91, LNCS 547, pp. 522-526, 1991.
-
(1991)
LNCS
, vol.547
, pp. 522-526
-
-
Pedersen, T.1
-
39
-
-
84948967487
-
Breaking an Efficient Anonymous Channel
-
Eurocrypt '94
-
B. Pfitzmann, Breaking an Efficient Anonymous Channel, Eurocrypt '94, LNCS 950, pp. 332-340, 1995.
-
(1995)
LNCS
, vol.950
, pp. 332-340
-
-
Pfitzmann, B.1
-
40
-
-
85032859691
-
How to break the direct RSA-implementation of mixes
-
Eurocrypt '89
-
B. Pfitzmann, A. Pfitzmann, How to break the direct RSA-implementation of mixes, Eurocrypt '89, LNCS 434, pp. 373-381, 1990.
-
(1990)
LNCS
, vol.434
, pp. 373-381
-
-
Pfitzmann, B.1
Pfitzmann, A.2
-
42
-
-
0002360237
-
Noninteractive zero-knowledge proofs of knowledge and chosen ciphertext attacks
-
C. Rackoff, D. Simon, Noninteractive zero-knowledge proofs of knowledge and chosen ciphertext attacks, 22nd STOC, pp. 433-444, 1991.
-
(1991)
22nd STOC
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.2
-
43
-
-
84957356080
-
Reciept-free Mix-Type Voting Scheme
-
Eurocrypt '95
-
K. Sako, J. Killian, Reciept-free Mix-Type Voting Scheme, Eurocrypt '95, LNCS 921, pp. 393-403, 1995.
-
(1995)
LNCS
, vol.921
, pp. 393-403
-
-
Sako, K.1
Killian, J.2
-
44
-
-
84937417404
-
Security of Signed El Gamal Encryption
-
Asiacrypt 2000
-
C. Schnorr, M. Jakobsson, Security of Signed El Gamal Encryption, Asiacrypt 2000, LNCS 1976, pp. 73-89, 2000.
-
(2000)
LNCS
, vol.1976
, pp. 73-89
-
-
Schnorr, C.1
Jakobsson, M.2
-
45
-
-
84958979582
-
On the Security of El Gamal based Encryption
-
International workshop on Public Key Cryptography
-
Y. Tsiounis, M. Yung, On the Security of El Gamal based Encryption, International workshop on Public Key Cryptography, LNCS 1431, pp. 117-134, 1998.
-
(1998)
LNCS
, vol.1431
, pp. 117-134
-
-
Tsiounis, Y.1
Yung, M.2
-
46
-
-
33646780827
-
Five Practical Attacks for "Optimistic Mixing for Exit-Polls"
-
proceedings of Selected Areas of Cryptography (SAC)
-
D. Wikström, Five Practical Attacks for "Optimistic Mixing for Exit-Polls", to appear in proceedings of Selected Areas of Cryptography (SAC), LNCS, 2003.
-
(2003)
LNCS
-
-
Wikström, D.1
|