-
1
-
-
84945134014
-
Priced oblivious transfer: How to sell digital goods
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Aiello, W., Ishai, Y., Reingold, O.: Priced oblivious transfer: How to sell digital goods. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 119-135. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 119-135
-
-
Aiello, W.1
Ishai, Y.2
Reingold, O.3
-
2
-
-
51849139720
-
-
Ajtai, M.: Generating hard instances of lattice problems. Quaderni di Matematica 13, 1-32 (2004); Preliminary version in STOC 1996
-
Ajtai, M.: Generating hard instances of lattice problems. Quaderni di Matematica 13, 1-32 (2004); Preliminary version in STOC 1996
-
-
-
-
3
-
-
0030679849
-
A public-key cryptosystem with worst-case/average- case equivalence
-
Ajtai, M., Dwork, C.: A public-key cryptosystem with worst-case/average- case equivalence. In: STOC, pp. 284-293 (1997)
-
(1997)
STOC
, pp. 284-293
-
-
Ajtai, M.1
Dwork, C.2
-
4
-
-
38049132285
-
Simulatable adaptive oblivious transfer
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Camenisch, J., Neven, G., Shelat, A.: Simulatable adaptive oblivious transfer. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 573-590. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 573-590
-
-
Camenisch, J.1
Neven, G.2
Shelat, A.3
-
5
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136-145 (2001)
-
(2001)
FOCS
, pp. 136-145
-
-
Canetti, R.1
-
6
-
-
84880897758
-
Universally composable commitments
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Canetti, R., Fischlin, M.: Universally composable commitments. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 19-40. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
7
-
-
0036038991
-
Universally composable two-party and multi-party secure computation
-
Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally composable two-party and multi-party secure computation. In: STOC, pp. 494-503 (2002)
-
(2002)
STOC
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
8
-
-
35248819315
-
Universal composition with joint state
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Canetti, R., Rabin, T.: Universal composition with joint state. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 265-281. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 265-281
-
-
Canetti, R.1
Rabin, T.2
-
9
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Cocks, C.: An identity based encryption scheme based on quadratic residues. In: IMA Int. Conf, pp. 360-363 (2001)
-
(2001)
IMA Int. Conf
, pp. 360-363
-
-
Cocks, C.1
-
10
-
-
84947267092
-
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
-
Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
-
Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 45-64
-
-
Cramer, R.1
Shoup, V.2
-
11
-
-
85030121757
-
Equivalence between two flavours of oblivious transfers
-
Pomerance, C, ed, CRYPTO 1987, Springer, Heidelberg
-
Crépeau, C.: Equivalence between two flavours of oblivious transfers. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 350-354. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 350-354
-
-
Crépeau, C.1
-
12
-
-
35248844164
-
Universally composable efficient multiparty computation from threshold homomorphic encryption
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Damgård, I., Nielsen, J.B.: Universally composable efficient multiparty computation from threshold homomorphic encryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 247-264. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 247-264
-
-
Damgård, I.1
Nielsen, J.B.2
-
13
-
-
0022080529
-
A randomized protocol for signing contracts
-
Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637-647 (1985)
-
(1985)
Commun. ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
14
-
-
35048837620
-
-
Garay, J.A., MacKenzie, P.D., Yang, K.: Efficient and universally composable committed oblivious transfer and applications. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 297-316. Springer, Heidelberg (2004)
-
Garay, J.A., MacKenzie, P.D., Yang, K.: Efficient and universally composable committed oblivious transfer and applications. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 297-316. Springer, Heidelberg (2004)
-
-
-
-
15
-
-
51849137205
-
Trapdoors for hard lattices and new cryptographic constructions
-
to appear
-
Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: STOC (to appear, 2008), http://eprint.iacr.org/2007/432
-
(2008)
STOC
-
-
Gentry, C.1
Peikert, C.2
Vaikuntanathan, V.3
-
16
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229 (1987)
-
(1987)
STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
17
-
-
38149091799
-
Blind identity-based encryption and simulatable oblivious transfer
-
Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
-
Green, M., Hohenberger, S.: Blind identity-based encryption and simulatable oblivious transfer. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 265-282. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 265-282
-
-
Green, M.1
Hohenberger, S.2
-
18
-
-
51849126287
-
Universally composable adaptive oblivious transfer. Cryptology ePrint Archive, Report 2008/163
-
Green, M., Hohenberger, S.: Universally composable adaptive oblivious transfer. Cryptology ePrint Archive, Report 2008/163 (2008), http://eprint.iacr.org/
-
-
-
Green, M.1
Hohenberger, S.2
-
19
-
-
33746072569
-
Perfect non-interactive zero knowledge for NP
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Groth, J., Ostrovsky, R., Sahai, A.: Perfect non-interactive zero knowledge for NP. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 339-358. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 339-358
-
-
Groth, J.1
Ostrovsky, R.2
Sahai, A.3
-
20
-
-
24144457853
-
Extending oblivious transfers efficiently
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
21
-
-
38049136533
-
Efficient two-party secure computation on committed inputs
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Jarecki, S., Shmatikov, V.: Efficient two-party secure computation on committed inputs. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 97-114. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 97-114
-
-
Jarecki, S.1
Shmatikov, V.2
-
22
-
-
24944473997
-
Smooth projective hashing and two-message oblivious transfer
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Kalai, Y.T.: Smooth projective hashing and two-message oblivious transfer. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 78-95. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 78-95
-
-
Kalai, Y.T.1
-
23
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
Kilian, J.: Founding cryptography on oblivious transfer. In: STOC, pp. 20-31 (1988)
-
(1988)
STOC
, pp. 20-31
-
-
Kilian, J.1
-
24
-
-
40249088241
-
-
Kol, G., Naor, M.: Cryptography and game theory: Designing protocols for exchanging information. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 320-339. Springer, Heidelberg (2008)
-
Kol, G., Naor, M.: Cryptography and game theory: Designing protocols for exchanging information. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 320-339. Springer, Heidelberg (2008)
-
-
-
-
25
-
-
43149086402
-
Efficient fully simulatable oblivious transfer
-
Malkin, T, ed, CTRSA 2008, Springer, Heidelberg
-
Lindell, Y.: Efficient fully simulatable oblivious transfer. In: Malkin, T. (ed.) CTRSA 2008. LNCS, vol. 4964. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4964
-
-
Lindell, Y.1
-
26
-
-
38749097694
-
-
Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. SIAM J. Comput. 37(1), 267-302 (2007); Preliminary version in FOCS 2004
-
Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. SIAM J. Comput. 37(1), 267-302 (2007); Preliminary version in FOCS 2004
-
-
-
-
27
-
-
84957096920
-
Oblivious transfer with adaptive queries
-
CRYPTO, Springer, Heidelberg
-
Naor, M., Pinkas, B.: Oblivious transfer with adaptive queries. In: CRYPTO. LNCS, pp. 573-590. Springer, Heidelberg (1999)
-
(1999)
LNCS
, pp. 573-590
-
-
Naor, M.1
Pinkas, B.2
-
29
-
-
51849152661
-
Lossy trapdoor functions and their applications
-
to appear
-
Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. In: STOC (to appear, 2008), http://eprint.iacr.org/2007/279
-
(2008)
STOC
-
-
Peikert, C.1
Waters, B.2
-
30
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Technical report, Harvard University
-
Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical report, Harvard University (1981)
-
(1981)
-
-
Rabin, M.O.1
-
31
-
-
20444451186
-
New lattice-based cryptographic constructions
-
Regev, O.: New lattice-based cryptographic constructions. J. ACM 51(6), 899-942 (2004)
-
(2004)
J. ACM
, vol.51
, Issue.6
, pp. 899-942
-
-
Regev, O.1
-
32
-
-
33745571012
-
On lattices, learning with errors, random linear codes, and cryptography
-
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: STOC, pp. 84-93 (2005)
-
(2005)
STOC
, pp. 84-93
-
-
Regev, O.1
-
33
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484-1509 (1997)
-
(1997)
SIAM J. Comput
, vol.26
, Issue.5
, pp. 1484-1509
-
-
Shor, P.W.1
-
34
-
-
0022882770
-
How to generate and exchange secrets (extended abstract)
-
Yao, A.C.-C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162-167 (1986)
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.C.-C.1
|