-
1
-
-
84937431456
-
Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
-
CRYPTO'02, Springer Verlag
-
J. Algesheimer, J. Camenisch, and V. Shoup, "Efficient computation modulo a shared secret with application to the generation of shared safe-prime products," CRYPTO'02, LNCS 2442, pp.417-432, Springer Verlag, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 417-432
-
-
Algesheimer, J.1
Camenisch, J.2
Shoup, V.3
-
3
-
-
84898960610
-
Completeness theorem for noncryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorem for noncryptographic fault-tolerant distributed computation," 20th Annual ACM Symposium on Theory of Computing, pp.1-10, 1988.
-
(1988)
20th Annual ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
4
-
-
33750056675
-
A practical implementation of secure auctions based on multiparty integer computation
-
Financial Cryptography 2006, Springer Verlag
-
P. Bogetoft, I. Damgård, T. Jakobsen, K. Nielsen, J. Pagter, and T. Toft, "A practical implementation of secure auctions based on multiparty integer computation," Financial Cryptography 2006, LNCS 4107, pp. 142-147, Springer Verlag, 2006.
-
(2006)
LNCS
, vol.4107
, pp. 142-147
-
-
Bogetoft, P.1
Damgård, I.2
Jakobsen, T.3
Nielsen, K.4
Pagter, J.5
Toft, T.6
-
5
-
-
0020984292
-
Lower bounds for constant depth circuits for prefix problems
-
ICALP, Springer Verlag
-
A.K. Chandra, S. Fortune, and R.J. Lipton, "Lower bounds for constant depth circuits for prefix problems," ICALP, LNCS 154, pp.109-117, Springer Verlag, 1983.
-
(1983)
LNCS
, vol.154
, pp. 109-117
-
-
Chandra, A.K.1
Fortune, S.2
Lipton, R.J.3
-
6
-
-
0020949874
-
Unbounded fan-in circuits and associative functions
-
A.K. Chandra, S. Fortune, and R.J. Lipton, "Unbounded fan-in circuits and associative functions," Proc. 15th ACM Symposium on Theory of Computing, pp.52-60, 1983.
-
(1983)
Proc. 15th ACM Symposium on Theory of Computing
, pp. 52-60
-
-
Chandra, A.K.1
Fortune, S.2
Lipton, R.J.3
-
7
-
-
84898947315
-
Multi-party unconditionally secure protocols
-
88, pp
-
D. Chaum, C. Crêpeau, and I. Damgård, "Multi-party unconditionally secure protocols," Proc. ACM STOC'88, pp.11-19, 1988.
-
(1988)
Proc. ACM STOC
, pp. 11-19
-
-
Chaum, D.1
Crêpeau, C.2
Damgård, I.3
-
8
-
-
84880872502
-
Secure distributed linear algebra in a constant number of rounds
-
CRYPTO'01, Springer Verlag
-
R. Cramer and I. Damgård, "Secure distributed linear algebra in a constant number of rounds," CRYPTO'01, LNCS 2139, pp.119-136, Springer Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 119-136
-
-
Cramer, R.1
Damgård, I.2
-
9
-
-
21144458613
-
Share conversion, pseudorandom secret sharing and applications to secure computation
-
Proc. 2nd Theory of Cryptography Conference, Springer Verlag
-
R. Cramer, I. Damgård, and Y. Ishai, "Share conversion, pseudorandom secret sharing and applications to secure computation," Proc. 2nd Theory of Cryptography Conference, LNCS 3378, pp.342-362, Springer Verlag, 2005.
-
(2005)
LNCS
, vol.3378
, pp. 342-362
-
-
Cramer, R.1
Damgård, I.2
Ishai, Y.3
-
10
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
EUROCRYPT'01, Springer Verlag
-
R. Cramer, I. Damgård, and J.B. Nielsen, "Multiparty computation from threshold homomorphic encryption," EUROCRYPT'01, LNCS 2045, pp.280-300, Springer Verlag, 2001.
-
(2001)
LNCS
, vol.2045
, pp. 280-300
-
-
Cramer, R.1
Damgård, I.2
Nielsen, J.B.3
-
11
-
-
33745567199
-
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
-
Proc. 3rd Theory of Cryptography Conference, Springer Verlag
-
I. Damgârd, M. Fitzi, E. Kiltz, J.B. Nielsen, and T. Toft, "Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation," Proc. 3rd Theory of Cryptography Conference, LNCS 3876, pp.285-304, Springer Verlag, 2006.
-
(2006)
LNCS
, vol.3876
, pp. 285-304
-
-
Damgârd, I.1
Fitzi, M.2
Kiltz, E.3
Nielsen, J.B.4
Toft, T.5
-
12
-
-
84867553981
-
-
I. Damgård and M. Jurik, A generalisation, a simplification and some applications of Paillier's probabilistic public-key system, PKC 2001, LNCS 1992, pp.119-136, Springer Verlag, 2001.
-
I. Damgård and M. Jurik, "A generalisation, a simplification and some applications of Paillier's probabilistic public-key system," PKC 2001, LNCS 1992, pp.119-136, Springer Verlag, 2001.
-
-
-
-
13
-
-
35248844164
-
Universally composable efficient multiparty computation from threshold homomorphic encryption
-
CRYPTO'03, Springer Verlag
-
I. Damgård and J.B. Nielsen, "Universally composable efficient multiparty computation from threshold homomorphic encryption," CRYPTO'03, LNCS 2729, pp.247-264, Springer Verlag, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 247-264
-
-
Damgård, I.1
Nielsen, J.B.2
-
14
-
-
84944328129
-
Sharing decryption in the context of voting or lotteries
-
Financial Cryptography 2000, Springer Verlag
-
P.-A. Fouque, G. Poupard, and J. Stern, "Sharing decryption in the context of voting or lotteries," Financial Cryptography 2000, LNCS 1962, pp.90-104, Springer Verlag, 2000.
-
(1962)
LNCS
, pp. 90-104
-
-
Fouque, P.-A.1
Poupard, G.2
Stern, J.3
-
15
-
-
38049066663
-
-
S. L. From and T. Jakobsen, Secure multi-party computation on integers, Master's Thesis, http://www.daimi.au.dk/~mas/thesis/index.html, 2006
-
S. L. From and T. Jakobsen, "Secure multi-party computation on integers," Master's Thesis, http://www.daimi.au.dk/~mas/thesis/index.html, 2006
-
-
-
-
16
-
-
0031628398
-
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
-
R. Gennaro, M.O. Rabin, and T. Rabin, "Simplified VSS and fast-track multiparty computations with applications to threshold cryptography," Proc. 17th ACM Symposium on Principles of Distributed Computing, pp.101-110, 1998.
-
(1998)
Proc. 17th ACM Symposium on Principles of Distributed Computing
, pp. 101-110
-
-
Gennaro, R.1
Rabin, M.O.2
Rabin, T.3
-
17
-
-
0023545076
-
How to play any mental game or a complete theorem for protocols with honest majority
-
O. Goldreich, S. Micali, and A. Wigderson, "How to play any mental game or a complete theorem for protocols with honest majority," Proc. 19th STOC, pp.218-229, 1987.
-
(1987)
Proc. 19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
20
-
-
24144476603
-
-
E. Ong and J. Kubiatowicz, Optimizing robustness while generating shared secret safe primes, PKC 2005, LNCS 3386, pp. 120-137, Springer Verlag, 2005.
-
E. Ong and J. Kubiatowicz, "Optimizing robustness while generating shared secret safe primes," PKC 2005, LNCS 3386, pp. 120-137, Springer Verlag, 2005.
-
-
-
-
21
-
-
33746092442
-
Efficient binary conversion for Paillier encrypted values
-
EUROCRYPT'06, Springer Verlag
-
B. Schoenmakers and P. Tuyls, "Efficient binary conversion for Paillier encrypted values," EUROCRYPT'06, LNCS 4004, pp.522-537, Springer Verlag, 2006.
-
(2006)
LNCS
, vol.4004
, pp. 522-537
-
-
Schoenmakers, B.1
Tuyls, P.2
-
22
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Communications of ACM, vol.22, no.11, pp.612-613, 1979.
-
(1979)
Communications of ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
23
-
-
38049020854
-
-
Available from, Tof05http://www.daimi.au.dk/~tomas/publications/progress.pdf
-
T. Toft, "Secure integer computation with applications in economy," http://www.aicis.alexandra.dk/uk/projects/scet.demo.htm#Tof05, Available from http://www.daimi.au.dk/~tomas/publications/progress.pdf
-
Secure integer computation with applications in economy
-
-
Toft, T.1
-
24
-
-
38049047863
-
An efficient, unconditionally secure equality test for secret shared values
-
Abstract available from
-
T. Toft, "An efficient, unconditionally secure equality test for secret shared values," Workshop on Models for Cryptographic Protocols (MCP 2006), Abstract available from http://www.daimi.au.dk/~buus/mcp2006/talks/T.pdf
-
(2006)
Workshop on Models for Cryptographic Protocols (MCP
-
-
Toft, T.1
-
25
-
-
0020312165
-
Protocols for secure computation
-
A. Yao, "Protocols for secure computation," Proc. 23rd FOCS, pp. 160-164, 1982.
-
(1982)
Proc. 23rd FOCS
, pp. 160-164
-
-
Yao, A.1
|