메뉴 건너뛰기




Volumn 4392 LNCS, Issue , 2007, Pages 555-574

How to shuffle in public

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; PROBLEM SOLVING; PUBLIC KEY CRYPTOGRAPHY;

EID: 38049032820     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70936-7_30     Document Type: Conference Paper
Times cited : (51)

References (30)
  • 1
    • 63449118333 scopus 로고    scopus 로고
    • Flaws in some robust optimistic mix-nets
    • Australasian Conference on Information Security and Privacy, ACISP 2003, of, Springer Verlag
    • M. Abe and H. Imai. Flaws in some robust optimistic mix-nets. In Australasian Conference on Information Security and Privacy - ACISP 2003, volume 2727 of Lecture Notes in Computer Science, pages 39-50. Springer Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2727 , pp. 39-50
    • Abe, M.1    Imai, H.2
  • 4
    • 50849114523 scopus 로고    scopus 로고
    • Fast batch verification for modular exponentiation and digital signatures
    • Springer Verlag
    • M. Bellare, J. A. Garay, and T. Rabin. Fast batch verification for modular exponentiation and digital signatures. In Advances in Cryptology - Eurocrypt '98, pages 236-250. Springer Verlag, 1998.
    • (1998) Advances in Cryptology - Eurocrypt '98 , pp. 236-250
    • Bellare, M.1    Garay, J.A.2    Rabin, T.3
  • 6
    • 0022188127 scopus 로고    scopus 로고
    • J. Cohen (Benaloh) and M. Fischer. A robust and verifiable cryptographically secure election scheme. In 28th IEEE Symposium on Foundations of Computer Science (FOCS), pages 372-382. IEEE Computer Society Press, 1985.
    • J. Cohen (Benaloh) and M. Fischer. A robust and verifiable cryptographically secure election scheme. In 28th IEEE Symposium on Foundations of Computer Science (FOCS), pages 372-382. IEEE Computer Society Press, 1985.
  • 7
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF formulas on ciphertexts
    • 2nd Theory of Cryptography Conference TCC, of, Springer Verlag
    • D. Boneh, E.-J. Goh, and K. Nissim. Evaluating 2-DNF formulas on ciphertexts. In 2nd Theory of Cryptography Conference (TCC), volume 3378 of Lecture Notes in Computer Science, pages 325-342. Springer Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 325-342
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 8
    • 84958626314 scopus 로고    scopus 로고
    • Towards realizing random oracles: Hash functions that hide all partial information
    • Advances in Cryptology, Crypto 1997, of, Springer Verlag
    • R. Canetti. Towards realizing random oracles: Hash functions that hide all partial information. In Advances in Cryptology - Crypto 1997, volume 1294 of Lecture Notes in Computer Science, pages 455-469. Springer Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 455-469
    • Canetti, R.1
  • 9
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses and digital pseudo-nyms
    • D. Chaum. Untraceable electronic mail, return addresses and digital pseudo-nyms. Communications of the ACM, 24(2):84-88, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 10
    • 35048839001 scopus 로고
    • Multi-authority secret-ballot elections with linear work
    • Technical report, CWI Centre for Mathematics and Computer Science, Amsterdam, The Netherlands
    • R. Cramer, M. Franklin, L. A.M. Schoenmakers, and M. Yung. Multi-authority secret-ballot elections with linear work. Technical report, CWI (Centre for Mathematics and Computer Science), Amsterdam, The Netherlands, 1995.
    • (1995)
    • Cramer, R.1    Franklin, M.2    Schoenmakers, L.A.M.3    Yung, M.4
  • 11
    • 84957375076 scopus 로고    scopus 로고
    • A secure and optimally efficient multi-authority election scheme
    • Advances in Cryptology, Eurocrypt '97, of, Springer Verlag
    • R. Cramer, R. Gennaro, and B. Schoenmakers. A secure and optimally efficient multi-authority election scheme. In Advances in Cryptology - Eurocrypt '97, volume 1233 of Lecture Notes in Computer Science, pages 103-118. Springer Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 103-118
    • Cramer, R.1    Gennaro, R.2    Schoenmakers, B.3
  • 12
    • 84867553981 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of paillier's probabilistic public-key system
    • Public Key Cryptography, PKC 2001, of, Springer Verlag
    • I. Damgård and M. Jurik. A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In Public Key Cryptography - PKC 2001, volume 1992 of Lecture Notes in Computer Science, pages 119-136. Springer Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.1992 , pp. 119-136
    • Damgård, I.1    Jurik, M.2
  • 13
    • 84944328129 scopus 로고    scopus 로고
    • Sharing decryption in the context of voting or lotteries
    • Financial Cryptography 2000, of, London, UK, Springer-Verlag
    • P.-A. Fouque, G. Poupard, and J. Stern. Sharing decryption in the context of voting or lotteries. In Financial Cryptography 2000, volume 2339 of Lecture Notes in Computer Science, pages 90-104, London, UK, 2001. Springer-Verlag.
    • (2001) Lecture Notes in Computer Science , vol.2339 , pp. 90-104
    • Fouque, P.-A.1    Poupard, G.2    Stern, J.3
  • 14
    • 84880857711 scopus 로고    scopus 로고
    • An efficient scheme for proving a shuffle
    • Advances in Cryptology, Crypto 2001, of, Springer Verlag
    • J. Furukawa and K. Sako. An efficient scheme for proving a shuffle. In Advances in Cryptology - Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 368-387. Springer Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 368-387
    • Furukawa, J.1    Sako, K.2
  • 15
    • 33748600953 scopus 로고    scopus 로고
    • S. Goldwasser and Y. Tauman Kalai. On the impossibility of obfuscation with auxiliary input. In 46th IEEE Symposium on Foundations of Computer Science (FOCS), pages 553-562. IEEE Computer Society Press, 2005.
    • S. Goldwasser and Y. Tauman Kalai. On the impossibility of obfuscation with auxiliary input. In 46th IEEE Symposium on Foundations of Computer Science (FOCS), pages 553-562. IEEE Computer Society Press, 2005.
  • 16
    • 38049023285 scopus 로고    scopus 로고
    • Gnu multiple precision arithmetic library (GMP)
    • available at, March
    • T. Granlund. Gnu multiple precision arithmetic library (GMP). Software available at http://swox.com/gmp, March 2005.
    • (2005) Software
    • Granlund, T.1
  • 17
    • 35248822599 scopus 로고    scopus 로고
    • A verifiable secret shuffle of homomorphic encryptions
    • Public Key Cryptography, PKC 2003, of, Springer Verlag
    • J. Groth. A verifiable secret shuffle of homomorphic encryptions. In Public Key Cryptography - PKC 2003, volume 2567 of Lecture Notes in Computer Science, pages 145-160. Springer Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2567 , pp. 145-160
    • Groth, J.1
  • 18
    • 33645970169 scopus 로고    scopus 로고
    • An oblivious transfer protocol with log-squared communication
    • Information Security, ISC 2005, of, Springer Verlag
    • Helger Lipmaa. An oblivious transfer protocol with log-squared communication. In Information Security - ISC 2005, volume 3650 of Lecture Notes in Computer Science, pages 314-328. Springer Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3650 , pp. 314-328
    • Lipmaa, H.1
  • 21
    • 34447334750 scopus 로고    scopus 로고
    • Private searching on streaming data. Cryptology ePrint Archive
    • Report 2005/242
    • R. Ostrovsky and W. E. Skeith III. Private searching on streaming data. Cryptology ePrint Archive, Report 2005/242, 2005. http://eprint.iacr.org/.
    • (2005)
    • Ostrovsky, R.1    Skeith III, W.E.2
  • 22
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Advances in Cryptology, Eurocrypt '99, of, Springer Verlag
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology - Eurocrypt '99, volume 1592 of Lecture Notes in Computer Science, pages 223-238. Springer Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 23
    • 85027158725 scopus 로고
    • Efficient anonymous channel and all/nothing election scheme
    • Advances in Cryptology, Eurocrypt '93, of, Springer Verlag
    • C. Park, K. Itoh, and K. Kurosawa. Efficient anonymous channel and all/nothing election scheme. In Advances in Cryptology - Eurocrypt '93, volume 765 of Lecture Notes in Computer Science, pages 248-259. Springer Verlag, 1994.
    • (1994) Lecture Notes in Computer Science , vol.765 , pp. 248-259
    • Park, C.1    Itoh, K.2    Kurosawa, K.3
  • 24
    • 84957356080 scopus 로고
    • Reciept-free mix-type voting scheme
    • Advances in Cryptology, Eurocrypt '95, of, Springer Verlag
    • K. Sako and J. Kilian. Reciept-free mix-type voting scheme. In Advances in Cryptology - Eurocrypt '95, volume 921 of Lecture Notes in Computer Science, pages 393-403. Springer Verlag, 1995.
    • (1995) Lecture Notes in Computer Science , vol.921 , pp. 393-403
    • Sako, K.1    Kilian, J.2
  • 25
    • 84957080948 scopus 로고    scopus 로고
    • A simple publicly verifiable secret sharing scheme and its application to electronic
    • Advances in Cryptology, Crypto '99, of, Springer Verlag
    • B. Schoenmakers. A simple publicly verifiable secret sharing scheme and its application to electronic. In Advances in Cryptology - Crypto '99, volume 3027 of Lecture Notes in Computer Science, pages 148-164. Springer Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.3027 , pp. 148-164
    • Schoenmakers, B.1
  • 27
    • 35048873776 scopus 로고    scopus 로고
    • A universally composable mix-net
    • 1st Theory of Cryptography Conference TCC, of, Springer Verlag
    • D. Wikström. A universally composable mix-net. In 1st Theory of Cryptography Conference (TCC), volume 2951 of Lecture Notes in Computer Science, pages 315-335. Springer Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2951 , pp. 315-335
    • Wikström, D.1
  • 29
    • 67650135363 scopus 로고    scopus 로고
    • A sender verifiable mix-net and a new proof of a shuffle. Cryptology ePrint Archive
    • Report 2004/137
    • D. Wikström. A sender verifiable mix-net and a new proof of a shuffle. Cryptology ePrint Archive, Report 2004/137, 2005. http://eprint.iacr. org/.
    • (2005)
    • Wikström, D.1
  • 30
    • 33746365152 scopus 로고    scopus 로고
    • An adaptively secure mix-net without erasures
    • 33rd International Colloquium on Automata, Languages and Programming ICALP, of, Springer Verlag
    • D. Wikström and J. Groth. An adaptively secure mix-net without erasures. In 33rd International Colloquium on Automata, Languages and Programming (ICALP), volume 4052 of Lecture Notes in Computer Science, pages 276-287. Springer Verlag, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4052 , pp. 276-287
    • Wikström, D.1    Groth, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.