-
1
-
-
35048820609
-
Efficient private matching and set intersection
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-9. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 1-9
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
2
-
-
0032669864
-
Oblivious transfer and polynomial evaluation
-
Atlanta, Georgia, pp, May
-
Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: 31st annual ACM Symposium on Theory of Computing (STOC 1999), Atlanta, Georgia, pp. 245-254 (May 1999)
-
(1999)
31st annual ACM Symposium on Theory of Computing (STOC
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
3
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
4
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
-
Gamal, T.E.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 19-22. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 19-22
-
-
Gamal, T.E.1
-
5
-
-
84958979582
-
-
Tsiounis, Y., Yung, M.: On the security of elgamal based encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, 1431, pp. 117-134. Springer, Heidelberg (1998)
-
Tsiounis, Y., Yung, M.: On the security of elgamal based encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 117-134. Springer, Heidelberg (1998)
-
-
-
-
6
-
-
33646728872
-
Private itemset support counting
-
Qing, S, Mao, W, López, J, Wang, G, eds, ICICS 2005, Springer, Heidelberg
-
Laur, S., Lipmaa, H., Mielikainen, T.: Private itemset support counting. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 97-111. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3783
, pp. 97-111
-
-
Laur, S.1
Lipmaa, H.2
Mielikainen, T.3
-
7
-
-
41549092791
-
-
Kiayias, A., Mitrofanova, A.: Syntax-driven private evaluation of quantified membership queries. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, 3989, pp. 470-485. Springer, Heidelberg (2006) [8] Kiayias, A., Mitrofanova, A.: Testing disjointness and private datasets. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, 3570, pp. 109-124. Springer, Heidelberg (2005)
-
Kiayias, A., Mitrofanova, A.: Syntax-driven private evaluation of quantified membership queries. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 470-485. Springer, Heidelberg (2006) [8] Kiayias, A., Mitrofanova, A.: Testing disjointness and private datasets. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 109-124. Springer, Heidelberg (2005)
-
-
-
-
8
-
-
56749157577
-
-
Hohenberger, S., Weis, S.A.: Honest-verifier private disjointness testing without random oracles. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, 4258, pp. 277-294. Springer, Heidelberg (2006)
-
Hohenberger, S., Weis, S.A.: Honest-verifier private disjointness testing without random oracles. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 277-294. Springer, Heidelberg (2006)
-
-
-
-
9
-
-
0030150177
-
Comparing information without leaking it
-
Fagin, R., Naor, M., Winkler, P.: Comparing information without leaking it. Communications of the ACM 39(5), 77-85 (1996)
-
(1996)
Communications of the ACM
, vol.39
, Issue.5
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
10
-
-
0345058962
-
Verifiable homomorphic oblivious transfer and private equality test
-
Laih, C.-S, ed, ASIACRYPT 2003, Springer, Heidelberg
-
Lipmaa, H.: Verifiable homomorphic oblivious transfer and private equality test. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 416-433. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2894
, pp. 416-433
-
-
Lipmaa, H.1
-
11
-
-
33745160750
-
Privacy-preserving set operaitons
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Kissner, L., Song, D.: Privacy-preserving set operaitons. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
12
-
-
41549104640
-
Efficient protocols for privacy preserving matching against distributed datasets
-
Ning, P, Qing, S, Li, N, eds, ICICS 2006, Springer, Heidelberg
-
Sang, Y., Shen, H., Tan, Y., Xiong, N.: Efficient protocols for privacy preserving matching against distributed datasets. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 210-227. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4307
, pp. 210-227
-
-
Sang, Y.1
Shen, H.2
Tan, Y.3
Xiong, N.4
-
13
-
-
49049102977
-
Privacy-preserving distributed set intersection
-
Barcelona, Spain, IEEE Computer Society Press, Los Alamitos
-
Ye, Q., Wang, H., Tartary, C.: Privacy-preserving distributed set intersection. In: 2nd Workshop on Advances in Information Security (conjuncted with ARES 2008), Barcelona, Spain, IEEE Computer Society Press, Los Alamitos (2008)
-
(2008)
2nd Workshop on Advances in Information Security (conjuncted with ARES
-
-
Ye, Q.1
Wang, H.2
Tartary, C.3
-
14
-
-
84945134014
-
Priced oblivious transfer: How to sell digital goods
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Aiello, B., Ishai, Y., Reingold, O.: Priced oblivious transfer: How to sell digital goods. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 119-135. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 119-135
-
-
Aiello, B.1
Ishai, Y.2
Reingold, O.3
-
15
-
-
84937422114
-
Distributed oblivious transfer
-
Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
-
Naor, M., Pinkas, B.: Distributed oblivious transfer. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 205-219. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 205-219
-
-
Naor, M.1
Pinkas, B.2
-
16
-
-
26044478785
-
-
Springer, Heidelberg
-
Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. Springer, Heidelberg (2003)
-
(2003)
Fundamentals of Computer Security
-
-
Pieprzyk, J.1
Hardjono, T.2
Seberry, J.3
|