-
1
-
-
84958035648
-
-
Atallah, M.J., Du, W.: Secure Multi-Party Computational Geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, 2125, pp. 165-179. Springer, Heidelberg (2001)
-
Atallah, M.J., Du, W.: Secure Multi-Party Computational Geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, vol. 2125, pp. 165-179. Springer, Heidelberg (2001)
-
-
-
-
2
-
-
35048846561
-
Strong Conditional Oblivious Transfer and Computing on Intervals
-
Lee, P.J, ed, ASIACRYPT 2004, Springer, Heidelberg
-
Blake, I.F., Kolesnikov, V.: Strong Conditional Oblivious Transfer and Computing on Intervals. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 515-529. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3329
, pp. 515-529
-
-
Blake, I.F.1
Kolesnikov, V.2
-
3
-
-
33750037945
-
-
Blake, I.F., Kolesnikov, V.: Conditional Encrypted Mapping and Comparing Encrypted Numbers. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, 4107, pp. 206-220. Springer, Heidelberg (2006)
-
Blake, I.F., Kolesnikov, V.: Conditional Encrypted Mapping and Comparing Encrypted Numbers. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 206-220. Springer, Heidelberg (2006)
-
-
-
-
4
-
-
24144433396
-
-
Boneh, D., Goh, E., Nissim, K.: Evaluating 2-DNF Formulas on Ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 325-341. Springer, Heidelberg (2005)
-
Boneh, D., Goh, E., Nissim, K.: Evaluating 2-DNF Formulas on Ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005)
-
-
-
-
5
-
-
84957680703
-
Zero-Knowledge Proof for Finite Field Arithmetic, or: Can Zero-Knowledge Be For Free
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Cramer, R., Damgård, I.: Zero-Knowledge Proof for Finite Field Arithmetic, or: Can Zero-Knowledge Be For Free. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 424-441. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 424-441
-
-
Cramer, R.1
Damgård, I.2
-
6
-
-
85016672373
-
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
-
Desmedt, Y. G, ed, CRYPTO 1994, Springer, Heidelberg
-
Cramer, R., Damgård, I., Schoenmakers, B.: Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In: Desmedt, Y. G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174-187. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
7
-
-
84937542853
-
-
Fischlin, M.: A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, 2020, pp. 457-471. Springer, Heidelberg (2001)
-
Fischlin, M.: A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 457-471. Springer, Heidelberg (2001)
-
-
-
-
8
-
-
35048820609
-
Effective Private Matching and Set Interseciton
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Freedman, M.J., Nissim, K., Pinkas, B.: Effective Private Matching and Set Interseciton. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
9
-
-
84958615646
-
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Fujisaki., E., Okamoto, T.: Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 16-30. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 16-30
-
-
Fujisaki, E.1
Okamoto, T.2
-
10
-
-
56749157577
-
-
Hohenberger, S., Weis, S.A.: Honest-Verifier Private Disjointness Testing Without Random Oracles. In: Danezis, G., Golle, P (eds.) PET 2006. LNCS, 4258, pp. 277-294. Springer, Heidelberg (2006)
-
Hohenberger, S., Weis, S.A.: Honest-Verifier Private Disjointness Testing Without Random Oracles. In: Danezis, G., Golle, P (eds.) PET 2006. LNCS, vol. 4258, pp. 277-294. Springer, Heidelberg (2006)
-
-
-
-
11
-
-
84969524054
-
-
Ioannidis., I., Grama, G.: An Efficient Protocol for Yao's Millionaires Problem. In: HICSS 2003, 07(7), p. 205. IEEE, Los Alamitos (2003)
-
Ioannidis., I., Grama, G.: An Efficient Protocol for Yao's Millionaires Problem. In: HICSS 2003, vol. 07(7), p. 205. IEEE, Los Alamitos (2003)
-
-
-
-
12
-
-
26444553355
-
-
Kiayias., A., Mitrofanova, A.: Testing Disjointness of Private Datasets. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, 3570, pp. 109-124. Springer, Heidelberg (2005)
-
Kiayias., A., Mitrofanova, A.: Testing Disjointness of Private Datasets. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 109-124. Springer, Heidelberg (2005)
-
-
-
-
13
-
-
26444581774
-
-
Lin, H.Y., Tzeng, W.G.: An Efficient Solution to the Millionaires Problem Based on Homomorphic Encryption. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 456-466. Springer, Heidelberg (2005)
-
Lin, H.Y., Tzeng, W.G.: An Efficient Solution to the Millionaires Problem Based on Homomorphic Encryption. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 456-466. Springer, Heidelberg (2005)
-
-
-
-
14
-
-
84942550998
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
16
-
-
33745150744
-
An Efficient Protocol for the Problem of Secure Two-Party Vector Dominance
-
IEEE, Los Alamitos
-
Sang, Y., Shen, H., Zhang, Z.: An Efficient Protocol for the Problem of Secure Two-Party Vector Dominance. In: 6th International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 488-492. IEEE, Los Alamitos (2005)
-
(2005)
6th International Conference on Parallel and Distributed Computing, Applications and Technologies
, pp. 488-492
-
-
Sang, Y.1
Shen, H.2
Zhang, Z.3
-
17
-
-
35048828873
-
Practical Two-Party Computation Based on the Conditional Gate
-
Lee, P.J, ed, ASIACRYPT 2004, Springer, Heidelberg
-
Schoenmakers, B., Tuyls, P.: Practical Two-Party Computation Based on the Conditional Gate. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 119-136. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3329
, pp. 119-136
-
-
Schoenmakers, B.1
Tuyls, P.2
-
18
-
-
12344258539
-
Efficient Signature Generation by Smart Cards
-
Schnorr, C.P.: Efficient Signature Generation by Smart Cards. Journal of Cryptology 4(3), 161-174 (1997)
-
(1997)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
19
-
-
0020312165
-
Protocols for Secure Computations
-
IEEE Computer Society Press, Los Alamitos
-
Yao, A.C.: Protocols for Secure Computations. In: 23rd IEEE Symp. on Foundations of Computer Science, pp. 160-164. IEEE Computer Society Press, Los Alamitos (1982)
-
(1982)
23rd IEEE Symp. on Foundations of Computer Science
, pp. 160-164
-
-
Yao, A.C.1
|