메뉴 건너뛰기




Volumn 4991 LNCS, Issue , 2008, Pages 319-333

Secure computation of the vector dominance problem

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; NETWORK PROTOCOLS; PROBLEM SOLVING; VECTORS;

EID: 41549152568     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-79104-1_23     Document Type: Conference Paper
Times cited : (5)

References (19)
  • 1
    • 84958035648 scopus 로고    scopus 로고
    • Atallah, M.J., Du, W.: Secure Multi-Party Computational Geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, 2125, pp. 165-179. Springer, Heidelberg (2001)
    • Atallah, M.J., Du, W.: Secure Multi-Party Computational Geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, vol. 2125, pp. 165-179. Springer, Heidelberg (2001)
  • 2
    • 35048846561 scopus 로고    scopus 로고
    • Strong Conditional Oblivious Transfer and Computing on Intervals
    • Lee, P.J, ed, ASIACRYPT 2004, Springer, Heidelberg
    • Blake, I.F., Kolesnikov, V.: Strong Conditional Oblivious Transfer and Computing on Intervals. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 515-529. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3329 , pp. 515-529
    • Blake, I.F.1    Kolesnikov, V.2
  • 3
    • 33750037945 scopus 로고    scopus 로고
    • Blake, I.F., Kolesnikov, V.: Conditional Encrypted Mapping and Comparing Encrypted Numbers. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, 4107, pp. 206-220. Springer, Heidelberg (2006)
    • Blake, I.F., Kolesnikov, V.: Conditional Encrypted Mapping and Comparing Encrypted Numbers. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 206-220. Springer, Heidelberg (2006)
  • 4
    • 24144433396 scopus 로고    scopus 로고
    • Boneh, D., Goh, E., Nissim, K.: Evaluating 2-DNF Formulas on Ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 325-341. Springer, Heidelberg (2005)
    • Boneh, D., Goh, E., Nissim, K.: Evaluating 2-DNF Formulas on Ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005)
  • 5
    • 84957680703 scopus 로고    scopus 로고
    • Zero-Knowledge Proof for Finite Field Arithmetic, or: Can Zero-Knowledge Be For Free
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Cramer, R., Damgård, I.: Zero-Knowledge Proof for Finite Field Arithmetic, or: Can Zero-Knowledge Be For Free. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 424-441. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 424-441
    • Cramer, R.1    Damgård, I.2
  • 6
    • 85016672373 scopus 로고
    • Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
    • Desmedt, Y. G, ed, CRYPTO 1994, Springer, Heidelberg
    • Cramer, R., Damgård, I., Schoenmakers, B.: Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In: Desmedt, Y. G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174-187. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 7
    • 84937542853 scopus 로고    scopus 로고
    • Fischlin, M.: A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, 2020, pp. 457-471. Springer, Heidelberg (2001)
    • Fischlin, M.: A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 457-471. Springer, Heidelberg (2001)
  • 8
    • 35048820609 scopus 로고    scopus 로고
    • Effective Private Matching and Set Interseciton
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Freedman, M.J., Nissim, K., Pinkas, B.: Effective Private Matching and Set Interseciton. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 9
    • 84958615646 scopus 로고    scopus 로고
    • Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations
    • Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
    • Fujisaki., E., Okamoto, T.: Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 16-30. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 16-30
    • Fujisaki, E.1    Okamoto, T.2
  • 10
    • 56749157577 scopus 로고    scopus 로고
    • Hohenberger, S., Weis, S.A.: Honest-Verifier Private Disjointness Testing Without Random Oracles. In: Danezis, G., Golle, P (eds.) PET 2006. LNCS, 4258, pp. 277-294. Springer, Heidelberg (2006)
    • Hohenberger, S., Weis, S.A.: Honest-Verifier Private Disjointness Testing Without Random Oracles. In: Danezis, G., Golle, P (eds.) PET 2006. LNCS, vol. 4258, pp. 277-294. Springer, Heidelberg (2006)
  • 11
    • 84969524054 scopus 로고    scopus 로고
    • Ioannidis., I., Grama, G.: An Efficient Protocol for Yao's Millionaires Problem. In: HICSS 2003, 07(7), p. 205. IEEE, Los Alamitos (2003)
    • Ioannidis., I., Grama, G.: An Efficient Protocol for Yao's Millionaires Problem. In: HICSS 2003, vol. 07(7), p. 205. IEEE, Los Alamitos (2003)
  • 12
    • 26444553355 scopus 로고    scopus 로고
    • Kiayias., A., Mitrofanova, A.: Testing Disjointness of Private Datasets. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, 3570, pp. 109-124. Springer, Heidelberg (2005)
    • Kiayias., A., Mitrofanova, A.: Testing Disjointness of Private Datasets. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 109-124. Springer, Heidelberg (2005)
  • 13
    • 26444581774 scopus 로고    scopus 로고
    • Lin, H.Y., Tzeng, W.G.: An Efficient Solution to the Millionaires Problem Based on Homomorphic Encryption. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 456-466. Springer, Heidelberg (2005)
    • Lin, H.Y., Tzeng, W.G.: An Efficient Solution to the Millionaires Problem Based on Homomorphic Encryption. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 456-466. Springer, Heidelberg (2005)
  • 14
    • 84942550998 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 17
    • 35048828873 scopus 로고    scopus 로고
    • Practical Two-Party Computation Based on the Conditional Gate
    • Lee, P.J, ed, ASIACRYPT 2004, Springer, Heidelberg
    • Schoenmakers, B., Tuyls, P.: Practical Two-Party Computation Based on the Conditional Gate. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 119-136. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3329 , pp. 119-136
    • Schoenmakers, B.1    Tuyls, P.2
  • 18
    • 12344258539 scopus 로고    scopus 로고
    • Efficient Signature Generation by Smart Cards
    • Schnorr, C.P.: Efficient Signature Generation by Smart Cards. Journal of Cryptology 4(3), 161-174 (1997)
    • (1997) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 19
    • 0020312165 scopus 로고
    • Protocols for Secure Computations
    • IEEE Computer Society Press, Los Alamitos
    • Yao, A.C.: Protocols for Secure Computations. In: 23rd IEEE Symp. on Foundations of Computer Science, pp. 160-164. IEEE Computer Society Press, Los Alamitos (1982)
    • (1982) 23rd IEEE Symp. on Foundations of Computer Science , pp. 160-164
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.