-
1
-
-
84945134014
-
Priced oblivious transfer: How to sell digital goods
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Aiello, W., Ishai, Y., Reingold, O.: Priced oblivious transfer: How to sell digital goods. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 119-135. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 119-135
-
-
Aiello, W.1
Ishai, Y.2
Reingold, O.3
-
2
-
-
26444464784
-
-
Bagga, W., Molva, R.: Policy-based cryptography and applications. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, 3570, pp. 72-87. Springer, Heidelberg (2005)
-
Bagga, W., Molva, R.: Policy-based cryptography and applications. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 72-87. Springer, Heidelberg (2005)
-
-
-
-
3
-
-
33750274790
-
-
Bagga, W., Molva, R.: Collusion-free policy-based encryption. In: Katsikas, S.K., Lopez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, 4176, pp. 233-245. Springer, Heidelberg (2006)
-
Bagga, W., Molva, R.: Collusion-free policy-based encryption. In: Katsikas, S.K., Lopez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 233-245. Springer, Heidelberg (2006)
-
-
-
-
5
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84-90 (1981)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.1
-
6
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Chaum, D.: Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM 28(10), 1030-1044 (1985)
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
7
-
-
84945135810
-
Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
8
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
9
-
-
80051636706
-
Single database private information retrieval implies oblivious transfer
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Di Crescenzo, G., Malkin, T., Ostrovsky, R.: Single database private information retrieval implies oblivious transfer. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 122-138. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 122-138
-
-
Di Crescenzo, G.1
Malkin, T.2
Ostrovsky, R.3
-
10
-
-
85001025766
-
Wallet databases with observers
-
Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
-
Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89-105. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
11
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
ACM Press, New York
-
Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. In: STOC '98: Proceedings of the thirtieth annual ACM symposium on Theory of computing, pp. 151-160. ACM Press, New York (1998)
-
(1998)
STOC '98: Proceedings of the thirtieth annual ACM symposium on Theory of computing
, pp. 151-160
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
12
-
-
34547248624
-
Data collection with self-enforcing privacy
-
ACM, New York
-
Golle, P., McSherry, F., Mironov, I.: Data collection with self-enforcing privacy. In: ACM Conference on Computer and Communications Security- ACM CCS 2006, pp. 69-78. ACM, New York (2006)
-
(2006)
ACM Conference on Computer and Communications Security- ACM
, vol.CCS 2006
, pp. 69-78
-
-
Golle, P.1
McSherry, F.2
Mironov, I.3
-
13
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
IEEE Computer Society, Los Alamitos
-
Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally-private information retrieval. In: FOCS '97. Proceedings of the 38th Annual Symposium on Foundations of Computer Science, pp. 364-373. IEEE Computer Society, Los Alamitos (1997)
-
(1997)
FOCS '97. Proceedings of the 38th Annual Symposium on Foundations of Computer Science
, pp. 364-373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
14
-
-
38149040429
-
Controlling access to personal data through Accredited Symmetrically Private Information Retrieval, Tech
-
Report, McGill University, School of Computer Science, July
-
Mohamed Layouni, Controlling access to personal data through Accredited Symmetrically Private Information Retrieval, Tech. Report, McGill University, School of Computer Science, (July 2007)
-
(2007)
-
-
Layouni, M.1
-
15
-
-
33645970169
-
-
Lipmaa, H.: An oblivious transfer protocol with log-squared communication. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, 3650, pp. 314-328. Springer, Heidelberg (2005)
-
Lipmaa, H.: An oblivious transfer protocol with log-squared communication. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 314-328. Springer, Heidelberg (2005)
-
-
-
-
16
-
-
84956852274
-
A new public-key cryptosystem as secure as factoring
-
Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
-
Okamoto, T., Uchiyama, S.: A new public-key cryptosystem as secure as factoring. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 308-318. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
17
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
IEEE Computer Society, Los Alamitos
-
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp. 44-55. IEEE Computer Society, Los Alamitos (2000)
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
|