-
1
-
-
34848898460
-
Covert two-party computation
-
ACM Press, New York
-
Ahn, L.v., Hopper, N.J., Langford, J.: Covert two-party computation. In: ACM Symposium on Theory of Computing (STOC 2005), pp. 513-522. ACM Press, New York (2005)
-
(2005)
ACM Symposium on Theory of Computing (STOC
, pp. 513-522
-
-
Ahn, L.V.1
Hopper, N.J.2
Langford, J.3
-
2
-
-
84945134014
-
Priced oblivious transfer: How to sell digital goods
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Aiello, W., Ishai, Y., Reingold, O.: Priced oblivious transfer: How to sell digital goods. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 119-135. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 119-135
-
-
Aiello, W.1
Ishai, Y.2
Reingold, O.3
-
3
-
-
20444482958
-
Hidden access control policies with hidden credentials
-
ACM Press, New York
-
Frikken, K.B., Atallah, M.J., Li, J.: Hidden access control policies with hidden credentials. In: ACM Workshop on Privacy in the Electronic Society (WPES 2004), p. 27. ACM Press, New York (2004)
-
(2004)
ACM Workshop on Privacy in the Electronic Society (WPES
, pp. 27
-
-
Frikken, K.B.1
Atallah, M.J.2
Li, J.3
-
4
-
-
33748485156
-
Attribute-based access control with hidden policies and hidden credentials
-
Frikken, K.B., Atallah, M.J., Li, J.: Attribute-based access control with hidden policies and hidden credentials. IEEE Trans. Comput. 55(10), 1259-1270 (2006)
-
(2006)
IEEE Trans. Comput
, vol.55
, Issue.10
, pp. 1259-1270
-
-
Frikken, K.B.1
Atallah, M.J.2
Li, J.3
-
5
-
-
30044439511
-
Privacy-preserving credit checking
-
ACM Press, New York
-
Frikken, K.B., Atallah, M.J., Zhang, C.: Privacy-preserving credit checking. In: ACM conference on Electronic Commerce (EC 2005), pp. 147-154. ACM Press, New York (2005)
-
(2005)
ACM conference on Electronic Commerce (EC
, pp. 147-154
-
-
Frikken, K.B.1
Atallah, M.J.2
Zhang, C.3
-
6
-
-
38349082709
-
Trust negotiation with hidden credentials, hidden policies, and policy cycles
-
Frikken, K.B., Li, J., Atallah, M.J.: Trust negotiation with hidden credentials, hidden policies, and policy cycles. In: Network and Distributed System Security Symposium (NDSS 2006) (2006)
-
(2006)
Network and Distributed System Security Symposium (NDSS
-
-
Frikken, K.B.1
Li, J.2
Atallah, M.J.3
-
7
-
-
49049099825
-
Improved garbled circuit: Free XOR gates and applications
-
Aceto, L, Damgård, I, Goldberg, L.A, Halldórsson, M.M, Ingólfsdóttir, A, Walukiewicz, I, eds, ICALP 2008, Part II, Springer, Heidelberg
-
Kolesnikov, V., Schneider, T.: Improved garbled circuit: Free XOR gates and applications. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 486-498. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5126
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
8
-
-
54249097947
-
-
Kolesnikov, V., Schneider, T.: A practical universal circuit construction and secure evaluation of private functions. In: Tsudik, G. (ed.) FC 2008. LNCS, 5143, pp. 83-97. Springer, Heidelberg (2008), http://thomaschneider.de/ FairplayPF
-
Kolesnikov, V., Schneider, T.: A practical universal circuit construction and secure evaluation of private functions. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 83-97. Springer, Heidelberg (2008), http://thomaschneider.de/ FairplayPF
-
-
-
-
9
-
-
38049016843
-
-
Laur, S., Lipmaa, H.: A new protocol for conditional disclosure of secrets and its applications. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, 4521, pp. 207-225. Springer, Heidelberg (2007)
-
Laur, S., Lipmaa, H.: A new protocol for conditional disclosure of secrets and its applications. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 207-225. Springer, Heidelberg (2007)
-
-
-
-
11
-
-
38049136534
-
An efficient protocol for secure two-party computation in the presence of malicious adversaries
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Lindell, Y., Pinkas, B.: An efficient protocol for secure two-party computation in the presence of malicious adversaries. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 52-78. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 52-78
-
-
Lindell, Y.1
Pinkas, B.2
-
12
-
-
52149120767
-
-
Lindell, Y., Pinkas, B., Smart, N.: Implementing two-party computation efficiently with security against malicious adversaries. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, 5229, pp. 2-20. Springer, Heidelberg (2008)
-
Lindell, Y., Pinkas, B., Smart, N.: Implementing two-party computation efficiently with security against malicious adversaries. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 2-20. Springer, Heidelberg (2008)
-
-
-
-
13
-
-
85084163840
-
-
Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay - a secure two-party computation system. In: USENIX (2004), http://www.cs.huji.ac.il/ project/Fairplay/
-
Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay - a secure two-party computation system. In: USENIX (2004), http://www.cs.huji.ac.il/ project/Fairplay/
-
-
-
-
14
-
-
0032669864
-
Oblivious transfer and polynomial evaluation
-
ACM Press, New York
-
Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: ACM Symposium on Theory of Computing (STOC 1999), pp. 245-254. ACM Press, New York (1999)
-
(1999)
ACM Symposium on Theory of Computing (STOC
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
15
-
-
68849100671
-
Practical secure evaluation of semi-private functions. Cryptology ePrint Archive
-
Report 2009/124
-
Paus, A., Sadeghi, A.-R., Schneider, T.: Practical secure evaluation of semi-private functions. Cryptology ePrint Archive, Report 2009/124 (2009), http://eprint.iacr.org/
-
(2009)
-
-
Paus, A.1
Sadeghi, A.-R.2
Schneider, T.3
-
16
-
-
67049095583
-
Generalized universal circuits for secure evaluation of private functions with application to data classification
-
Lee, P.J, Cheon, J.H, eds, ICISC 2008, Springer, Heidelberg
-
Sadeghi, A.-R., Schneider, T.: Generalized universal circuits for secure evaluation of private functions with application to data classification. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 336-353. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5461
, pp. 336-353
-
-
Sadeghi, A.-R.1
Schneider, T.2
|