-
1
-
-
84956854310
-
Mix-networks on permutation net-works
-
Asiacrypt 98, Berlin, Springer-Verlag
-
M Abe. Mix-networks on permutation net-works. In Asiacrypt 98, pages 258-273, Berlin, 1999. Springer-Verlag. Lecture Notes in Computer Science 1716.
-
(1999)
Lecture Notes in Computer Science
, vol.1716
, pp. 258-273
-
-
Abe, M.1
-
2
-
-
84937409147
-
Remarks on mix-network based on permutation networks
-
Public Key Cryptography 2001, Berlin, Springer-Verlag
-
Masayuki Abe and Fumitaka Hoshino. Remarks on mix-network based on permutation networks. In Public Key Cryptography 2001, pages 317-324, Berlin, 2001. Springer-Verlag. Lecture Notes in Computer Science 1992.
-
(2001)
Lecture Notes in Computer Science
, vol.1992
, pp. 317-324
-
-
Abe, M.1
Hoshino, F.2
-
3
-
-
84958964379
-
M+1-st price auction using homomorphic encryption
-
Public Key Cryptology 2002, Berlin, Springer-Verlag
-
Masayuki Abe and Koutarou Suzuki. M+1-st price auction using homomorphic encryption. In Public Key Cryptology 2002, pages 115-124, Berlin, 2002. Springer-Verlag. Lecture Notes in Computer Science Volume 2288.
-
(2002)
Lecture Notes in Computer Science
, vol.2288
, pp. 115-124
-
-
Abe, M.1
Suzuki, K.2
-
6
-
-
0019532104
-
Untraceable electronic mail, return address and digital pseudonym
-
D Chaum. Untraceable electronic mail, return address and digital pseudonym. In Communications of the ACM, 24(2), pages 84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
7
-
-
84947288202
-
Efficient sealed-bid auctions for massive numbers of bidders with lump comparison
-
Information Security, 4th International Conference, ISC 2001, Berlin, Springer-Verlag
-
Koji Chida, Kunio Kobayashi, and Hikaru Morita. Efficient sealed-bid auctions for massive numbers of bidders with lump comparison. In Information Security, 4th International Conference, ISC 2001, pages 408-419, Berlin, 2001. Springer-Verlag. Lecture Notes in Computer Science Volume 2200.
-
(2001)
Lecture Notes in Computer Science
, vol.2200
, pp. 408-419
-
-
Chida, K.1
Kobayashi, K.2
Morita, H.3
-
8
-
-
0001710760
-
The design and implementation of a secure auction service
-
May
-
Matthew K Franklin and Michael K Reiter. The design and implementation of a secure auction service. In IEEE Transactions on Software Enginerring, volume 5, pages 302-312, May 1996.
-
(1996)
IEEE Transactions on Software Enginerring
, vol.5
, pp. 302-312
-
-
Franklin, M.K.1
Reiter, M.K.2
-
9
-
-
84880857711
-
An efficient scheme for proving a shuffle
-
CRYPTO2001, Springer
-
Jun Furukawa and Kazue Sako. An efficient scheme for proving a shuffle. In CRYPTO2001, volume 2139 of Lecture Notes in Computer Science, pages 368-387. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 368-387
-
-
Furukawa, J.1
Sako, K.2
-
10
-
-
84958742387
-
Optimistic mixing for exit-polls
-
ASIACRYPT 2002, Berlin, Springer-Verlag
-
Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, and Ari Juels. Optimistic mixing for exit-polls. In ASIACRYPT 2002, pages 451-465, Berlin, 2002. Springer-Verlag. Lecture Notes in Computer Science Volume 1592.
-
(2002)
Lecture Notes in Computer Science
, vol.1592
, pp. 451-465
-
-
Golle, P.1
Zhong, S.2
Boneh, D.3
Jakobsson, M.4
Juels, A.5
-
11
-
-
35248822599
-
A verifiable secret shuffle of homomorphic encryptions
-
Public Key Cryptography 2003, Berlin, Springer-Verlag
-
Jens Groth. A verifiable secret shuffle of homomorphic encryptions. In Public Key Cryptography 2003, pages 145-160, Berlin, 2003. Springer-Verlag. Lecture Notes in Computer Science Volume 2567.
-
(2003)
Lecture Notes in Computer Science
, vol.2567
, pp. 145-160
-
-
Groth, J.1
-
12
-
-
85084162002
-
Making mix nets robust for electronic voting by randomizsed partial checking
-
San Francisco, CA, USA, August 5-9, 2002, USENIX
-
Markus Jakobsson, Ari Juels, and Ronald L. Rivest. Making mix nets robust for electronic voting by randomizsed partial checking. In Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, August 5-9, 2002, pages 339-353. USENIX, 2002.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 339-353
-
-
Jakobsson, M.1
Juels, A.2
Rivest, R.L.3
-
15
-
-
0842339416
-
(m+1)st-price auction
-
The Fifth International Conference on Financial Cryptography 2001, Berlin, February Springer-Verlag
-
Hiroaki Kikuchi. (m+1)st-price auction. In The Fifth International Conference on Financial Cryptography 2001, pages 291-298, Berlin, February 2001. Springer-Verlag. Lecture Notes in Computer Science Volume 2339.
-
(2001)
Lecture Notes in Computer Science
, vol.2339
, pp. 291-298
-
-
Kikuchi, H.1
-
16
-
-
84961626294
-
Distributed auction servers resolving winner and winning bid without revealing privacy of bids
-
July
-
Hiroaki Kikuchi, Shinji Hotta, Kensuke Abe, and Shohachiro Nakanishi. Distributed auction servers resolving winner and winning bid without revealing privacy of bids. In proc. of International Workshop on Next Generation Internet (NGITA2000), IEEE, pages 307-312, July 2000.
-
(2000)
Proc. of International Workshop on next Generation Internet (NGITA2000), IEEE
, pp. 307-312
-
-
Kikuchi, H.1
Hotta, S.2
Abe, K.3
Nakanishi, S.4
-
17
-
-
0842296493
-
Secure vickrey auctions without thresh-old trust
-
Berlin, Springer-Verlag
-
H Lipmaa, N Asokan, and V Niemi. Secure vickrey auctions without thresh-old trust. In Proceedings of the 6th Annual Conference on Financial Cryptography, 2002, Berlin, 2002. Springer-Verlag.
-
(2002)
Proceedings of the 6th Annual Conference on Financial Cryptography, 2002
-
-
Lipmaa, H.1
Asokan, N.2
Niemi, V.3
-
18
-
-
84959050733
-
An internet anonymous auction scheme
-
International Conference on Information Security and Cryptology 2000, Berlin, Springer-Verlag
-
Yi Mu and Vijay Varadharajan. An internet anonymous auction scheme. In International Conference on Information Security and Cryptology 2000, pages 171-182, Berlin, 2000. Springer-Verlag. Lecture Notes in Computer Science Volume 2015.
-
(2000)
Lecture Notes in Computer Science
, vol.2015
, pp. 171-182
-
-
Mu, Y.1
Varadharajan, V.2
-
21
-
-
0002986502
-
Fault tolerant anonymous channel
-
Proc. of International Conference on Information and Communication Security 1997, Berlin, Springer-Verlag
-
W Ogata, K Kurosawa, K Sako, and K Takatani. Fault tolerant anonymous channel. In Proc. of International Conference on Information and Communication Security 1997, pages 440-444, Berlin, 2000. Springer-Verlag. Lecture Notes in Computer Science Volume 1334.
-
(2000)
Lecture Notes in Computer Science
, vol.1334
, pp. 440-444
-
-
Ogata, W.1
Kurosawa, K.2
Sako, K.3
Takatani, K.4
-
22
-
-
84937415944
-
A length-invariant hybrid mix
-
ASIACRYPT 2000, Berlin, Springer-Verlag
-
Miyako Ohkubo and Masayuki Abe. A length-invariant hybrid mix. In ASIACRYPT 2000, pages 178-191, Berlin, 2000. Springer-Verlag. Lecture Notes in Computer Science Volume 1976.
-
(2000)
Lecture Notes in Computer Science
, vol.1976
, pp. 178-191
-
-
Ohkubo, M.1
Abe, M.2
-
23
-
-
27544464120
-
A second-price sealed-bid auction with the discriminant of the p-th root
-
Berlin, Springer-Verlag
-
Kazumasa Omote and Atsuko Miyaji. A second-price sealed-bid auction with the discriminant of the p-th root. In Financial Cryptography 2002, Berlin, 2002. Springer-Verlag.
-
(2002)
Financial Cryptography 2002
-
-
Omote, K.1
Miyaji, A.2
-
24
-
-
85027158725
-
Efficient anonymous channel and all/nothing election scheme
-
Tor Helleseth, editor, Advances in Cryptology - EuroCrypt '93, Berlin, Springer-Verlag
-
C. Park, K. Itoh, and K. Kurosawa. Efficient anonymous channel and all/nothing election scheme. In Tor Helleseth, editor, Advances in Cryptology - EuroCrypt '93, pages 248-259, Berlin, 1993. Springer-Verlag. Lecture Notes in Computer Science Volume 765.
-
(1993)
Lecture Notes in Computer Science
, vol.765
, pp. 248-259
-
-
Park, C.1
Itoh, K.2
Kurosawa, K.3
-
25
-
-
84876222959
-
Distributed provers with applications to undeniable signatures
-
EUROCRYPT 91, Berlin, Springer-Verlag
-
Torben P. Pedersen. Distributed provers with applications to undeniable signatures. In EUROCRYPT 91, pages 221-242, Berlin, 1991. Springer-Verlag. Lecture Notes in Computer Science Volume 547.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 221-242
-
-
Pedersen, T.P.1
-
26
-
-
0002523070
-
An auction scheme which hides the bids of losers
-
Berlin, Springer-Verlag. Lecture Notes in Computer Science Volume 1880
-
K Sako. An auction scheme which hides the bids of losers. In Public Key Cryptology 2000, pages 422-432, Berlin, 2000. Springer-Verlag. Lecture Notes in Computer Science Volume 1880.
-
(2000)
Public Key Cryptology 2000
, pp. 422-432
-
-
Sako, K.1
-
27
-
-
84957356080
-
Receipt-free mix-type voting scheme-a practical solution to the implementation of a voting booth
-
EUROCRYPT '95, Berlin, Springer-Verlag
-
K. Sako and J. Kilian. Receipt-free mix-type voting scheme-a practical solution to the implementation of a voting booth. In EUROCRYPT '95, pages 393-403, Berlin, 1995. Springer-Verlag. Lecture Notes in Computer Science Volume 921.
-
(1995)
Lecture Notes in Computer Science
, vol.921
, pp. 393-403
-
-
Sako, K.1
Kilian, J.2
-
28
-
-
0005038557
-
A bulletin-board based digital auction scheme with bidding down strategy -towards anonymous electronic bidding without anonymous channels nor trusted centers
-
Hong Kong, City University of Hong Kong Press
-
Kouichi Sakurai and S Miyazaki. A bulletin-board based digital auction scheme with bidding down strategy -towards anonymous electronic bidding without anonymous channels nor trusted centers. In Proc. International Workshop on Cryptographic Techniques and E-Commerce, pages 180-187, Hong Kong, 1999. City University of Hong Kong Press.
-
(1999)
Proc. International Workshop on Cryptographic Techniques and E-Commerce
, pp. 180-187
-
-
Sakurai, K.1
Miyazaki, S.2
-
29
-
-
84959060612
-
Efficient sealed-bid auction using hash chain
-
International Conference on Information Security and Cryptology 2000, Berlin, Springer-Verlag
-
Koutarou Suzuki, Kunio Kobayashi, and Hikaru Morita. Efficient sealed-bid auction using hash chain. In International Conference on Information Security and Cryptology 2000, pages 183-191, Berlin, 2000. Springer-Verlag. Lecture Notes in Computer Science 2015.
-
(2000)
Lecture Notes in Computer Science
, vol.2015
, pp. 183-191
-
-
Suzuki, K.1
Kobayashi, K.2
Morita, H.3
-
30
-
-
84958975522
-
A three phased schema for sealed bid auction system design
-
Information Security and Privacy, 5th Australasian Conference, ACISP'2000, Berlin, Springer-Verlag
-
Kapali Viswanathan, Colin Boyd, and Ed Dawson. A three phased schema for sealed bid auction system design. In Information Security and Privacy, 5th Australasian Conference, ACISP'2000, pages 412-426, Berlin, 2000. Springer-Verlag. Lecture Notes in Computer Science 1841.
-
(2000)
Lecture Notes in Computer Science
, vol.1841
, pp. 412-426
-
-
Viswanathan, K.1
Boyd, C.2
Dawson, E.3
-
31
-
-
0034447261
-
Reducing the round complexity of a sealed-bid auction protocol with an off-line ttp
-
ACM
-
Yuji Watanabe and Hideki Imai. Reducing the round complexity of a sealed-bid auction protocol with an off-line ttp. In STOC 2000, pages 80-86. ACM, 2000.
-
(2000)
STOC 2000
, pp. 80-86
-
-
Watanabe, Y.1
Imai, H.2
|