메뉴 건너뛰기




Volumn , Issue , 2008, Pages 327-334

Fuzzy private matching (extended abstract)

Author keywords

[No Author keywords available]

Indexed keywords

CHLORINE COMPOUNDS; HELIUM;

EID: 49049118519     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2008.170     Document Type: Conference Paper
Times cited : (15)

References (19)
  • 2
    • 0035879575 scopus 로고    scopus 로고
    • A fair and efficient solution to the socialist millionaires' problem
    • R Boudot, B. Schoenmakers, and J. Traorá. A fair and efficient solution to the socialist millionaires' problem. Discrete Applied Mathematics, 111(1-2):23-36, 2001.
    • (2001) Discrete Applied Mathematics , vol.111 , Issue.1-2 , pp. 23-36
    • Boudot, R.1    Schoenmakers, B.2    Traorá, J.3
  • 3
    • 0036038991 scopus 로고    scopus 로고
    • Universally composable two-party and multi-party secure computation
    • R. Canetti, Y. Lindell, R. Ostrovsky, and A. Sahai. Universally composable two-party and multi-party secure computation. In STOC, pages 494-503, 2002.
    • (2002) STOC , pp. 494-503
    • Canetti, R.1    Lindell, Y.2    Ostrovsky, R.3    Sahai, A.4
  • 5
    • 38049093878 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Cryptology ePrint Archive
    • Report 2003/235
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Cryptology ePrint Archive, Report 2003/235, 2003.
    • (2003)
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 7
    • 0030150177 scopus 로고    scopus 로고
    • Comparing information without leaking it
    • R. Fagin, M. Naor, and P. Winkler. Comparing information without leaking it. Communications of the ACM, 39(5):77-85, 1996.
    • (1996) Communications of the ACM , vol.39 , Issue.5 , pp. 77-85
    • Fagin, R.1    Naor, M.2    Winkler, P.3
  • 12
    • 0023545076 scopus 로고
    • How to play any mental game or a completeness theorem for protocols with honest majority
    • ACM
    • O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In STOC, pages 218-229. ACM, 1987.
    • (1987) STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 14
    • 33745565439 scopus 로고    scopus 로고
    • Polylogarithmic private approximations and efficient matching
    • The third Theory of Cryptography conference 2006, of
    • P. Indyk and D. Woodruff. Polylogarithmic private approximations and efficient matching. In The third Theory of Cryptography conference 2006, volume 3876 of LNCS, pages 245-264, 2006.
    • (2006) LNCS , vol.3876 , pp. 245-264
    • Indyk, P.1    Woodruff, D.2
  • 16
    • 49049087818 scopus 로고    scopus 로고
    • Communication complexity and secure function evaluation
    • cs.CR/0109011
    • M. Naor and K. Nissim. Communication complexity and secure function evaluation. CoRR, cs.CR/0109011, 2001.
    • (2001) CoRR
    • Naor, M.1    Nissim, K.2
  • 18
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • May
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology - EUROCRYPT 1999., pages 223-238, May 1999.
    • (1999) Advances in Cryptology - EUROCRYPT 1999 , pp. 223-238
    • Paillier, P.1
  • 19
    • 0018545449 scopus 로고
    • How to share a secret
    • November
    • A. Shamir. How to share a secret. In Communications of the ACM, vol. 22, n.11, pages 612-613, November 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.