-
1
-
-
84937431456
-
Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
-
[ACS02] In: Yung, M. (ed.) Springer, Heidelberg
-
[ACS02] Algesheimer, J., Camenisch, J.L., Shoup, V.: Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 417-432. Springer, Heidelberg (2002)
-
(2002)
CRYPTO 2002. LNCS
, vol.2442
, pp. 417-432
-
-
Algesheimer, J.1
Camenisch, J.L.2
Shoup, V.3
-
2
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computations
-
[BGW88] ACM Press, New York
-
[BGW88] Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computations. In: 20th Annual ACM Symposium on Theory of Computing, pp. 1-10. ACM Press, New York (1988)
-
(1988)
20th Annual ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
33745567199
-
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
-
3876 LNCS Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
[DFK+06] Damgård, I.B., Fitzi, M., Kiltz, E., Nielsen, J.B., Toft, T.: Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 285-304. Springer, Heidelberg (2006) (Pubitemid 43979854)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 285-304
-
-
Damgard, I.1
Fitzi, M.2
Kiltz, E.3
Nielsen, J.B.4
Toft, T.5
-
4
-
-
35248844164
-
Universally composable efficient multiparty computation from threshold homomorphic encryption
-
[DN03] Damgård, I.B., Nielsen, J.B.: Universally composable efficient multiparty computation from threshold homomorphic encryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 247-264. Springer, Heidelberg (2003) (Pubitemid 137636946)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2729
, pp. 247-264
-
-
Damgard, I.1
Nielsen, J.B.2
-
5
-
-
38049034355
-
Multiparty computation for interval, equality, and comparison without bit-decomposition protocol
-
[NO07] In: Okamoto, T., Wang, X. (eds.) Springer, Heidelberg
-
[NO07] Nishide, T., Ohta, K.: Multiparty computation for interval, equality, and comparison without bit-decomposition protocol. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 343-360. Springer, Heidelberg (2007)
-
(2007)
PKC 2007. LNCS
, vol.4450
, pp. 343-360
-
-
Nishide, T.1
Ohta, K.2
-
6
-
-
0018545449
-
How to share a secret
-
[Sha79]
-
[Sha79] Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612-613 (1979)
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
7
-
-
33746092442
-
Efficient binary conversion for Paillier encrypted values
-
4004 LNCS DOI 10.1007/11761679-31, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
[ST06] Schoenmakers, B., Tuyls, P.: Efficient binary conversion for paillier encrypted values. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 522-537. Springer, Heidelberg (2006) (Pubitemid 44072259)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 522-537
-
-
Schoenmakers, B.1
Tuyls, P.2
|