-
1
-
-
0038487086
-
Secret handshakes from pairing-based key agreements
-
Oakland, CA, May
-
D. Balfanz, G. Durfee, N. Shankar, D. Smetters, J. Staddon, and H.-C. Wong. Secret handshakes from pairing-based key agreements. In 24th IEEE Symposium on Security and Privacy, page 180, Oakland, CA, May 2003.
-
(2003)
24th IEEE Symposium on Security and Privacy
, pp. 180
-
-
Balfanz, D.1
Durfee, G.2
Shankar, N.3
Smetters, D.4
Staddon, J.5
Wong, H.-C.6
-
2
-
-
0035879575
-
A fair and efficient solution to the socialist millionaires' problem
-
R Boudot, B. Schoenmakers, and J. Traorá. A fair and efficient solution to the socialist millionaires' problem. Discrete Applied Mathematics, 111(1-2):23-36, 2001.
-
(2001)
Discrete Applied Mathematics
, vol.111
, Issue.1-2
, pp. 23-36
-
-
Boudot, R.1
Schoenmakers, B.2
Traorá, J.3
-
3
-
-
0036038991
-
Universally composable two-party and multi-party secure computation
-
R. Canetti, Y. Lindell, R. Ostrovsky, and A. Sahai. Universally composable two-party and multi-party secure computation. In STOC, pages 494-503, 2002.
-
(2002)
STOC
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
4
-
-
35048855095
-
Secret handshakes from ca-oblivious encryption
-
Advances in Cryptology, ASIACRYPT, December
-
C. Castelluccia, S. Jarecki, and G. Tsudik. Secret handshakes from ca-oblivious encryption. In In Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, volume 3329, pages 293-307, December 2004.
-
(2004)
10th International Conference on the Theory and Application of Cryptology and Information Security
, vol.3329
, pp. 293-307
-
-
Castelluccia, C.1
Jarecki, S.2
Tsudik, G.3
-
5
-
-
38049093878
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Cryptology ePrint Archive
-
Report 2003/235
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Cryptology ePrint Archive, Report 2003/235, 2003.
-
(2003)
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
7
-
-
0030150177
-
Comparing information without leaking it
-
R. Fagin, M. Naor, and P. Winkler. Comparing information without leaking it. Communications of the ACM, 39(5):77-85, 1996.
-
(1996)
Communications of the ACM
, vol.39
, Issue.5
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
8
-
-
84879521412
-
Secure multiparty computation of approximations
-
J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, M. J. Strauss, and R. N. Wright. Secure multiparty computation of approximations. Lecture Notes in Computer Science, 2076:927+, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2076
-
-
Feigenbaum, J.1
Ishai, Y.2
Malkin, T.3
Nissim, K.4
Strauss, M.J.5
Wright, R.N.6
-
10
-
-
24944523186
-
On private scalar product computation for privacy-preserving data mining
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen. On private scalar product computation for privacy-preserving data mining. Lecture Notes in Computer Science, 3506:104-120, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3506
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikainen, T.4
-
12
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
ACM
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In STOC, pages 218-229. ACM, 1987.
-
(1987)
STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
14
-
-
33745565439
-
Polylogarithmic private approximations and efficient matching
-
The third Theory of Cryptography conference 2006, of
-
P. Indyk and D. Woodruff. Polylogarithmic private approximations and efficient matching. In The third Theory of Cryptography conference 2006, volume 3876 of LNCS, pages 245-264, 2006.
-
(2006)
LNCS
, vol.3876
, pp. 245-264
-
-
Indyk, P.1
Woodruff, D.2
-
16
-
-
49049087818
-
Communication complexity and secure function evaluation
-
cs.CR/0109011
-
M. Naor and K. Nissim. Communication complexity and secure function evaluation. CoRR, cs.CR/0109011, 2001.
-
(2001)
CoRR
-
-
Naor, M.1
Nissim, K.2
-
18
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
May
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology - EUROCRYPT 1999., pages 223-238, May 1999.
-
(1999)
Advances in Cryptology - EUROCRYPT 1999
, pp. 223-238
-
-
Paillier, P.1
-
19
-
-
0018545449
-
How to share a secret
-
November
-
A. Shamir. How to share a secret. In Communications of the ACM, vol. 22, n.11, pages 612-613, November 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|