-
1
-
-
1142303699
-
Information sharing across private databases
-
ACM, New York
-
Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: SIGMOD 2003: Proceedings of the 2003 ACM SIGMOD international conference on Management of data, pp. 86-97. ACM, New York (2003)
-
(2003)
SIGMOD 2003: Proceedings of the 2003 ACM SIGMOD international conference on Management of data
, pp. 86-97
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
2
-
-
84968518238
-
Factoring polynomials over large finite fields
-
Berlekamp, E.: Factoring polynomials over large finite fields. Mathematics of Computation 24, 713-735 (1970)
-
(1970)
Mathematics of Computation
, vol.24
, pp. 713-735
-
-
Berlekamp, E.1
-
3
-
-
0035879575
-
A fair and efficient solution to the socialist millionaires problem
-
Boudot, F., Schoenmakers, B., Traoré, J.: A fair and efficient solution to the socialist millionaires problem. Discrete Applied Mathematics 111, 2001 (2001)
-
(2001)
Discrete Applied Mathematics
, vol.111
, pp. 2001
-
-
Boudot, F.1
Schoenmakers, B.2
Traoré, J.3
-
5
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13, 2000 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, pp. 2000
-
-
Canetti, R.1
-
6
-
-
40249113229
-
-
Choi, S., Dachman-Soled, D., Malkin, T., Wee, H.: Black-box construction of a non-malleable encryption scheme from any semantically secure one. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 427-444. Springer, Heidelberg (2008)
-
Choi, S., Dachman-Soled, D., Malkin, T., Wee, H.: Black-box construction of a non-malleable encryption scheme from any semantically secure one. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 427-444. Springer, Heidelberg (2008)
-
-
-
-
7
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
-
El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10-18. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 10-18
-
-
El Gamal, T.1
-
8
-
-
0030150177
-
Comparing information without leaking it
-
Fagin, R., Naor, M., Winkler, P.: Comparing information without leaking it. Communications of the ACM 39, 77-85 (1996)
-
(1996)
Communications of the ACM
, vol.39
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
9
-
-
35048820609
-
Efficient private matching and set intersection
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
10
-
-
33646562165
-
Foundations of cryptography: A primer. Found
-
Goldreich, O.: Foundations of cryptography: a primer. Found. Trends Theor. Comput. Sci. 1(1), 1-116 (2005)
-
(2005)
Trends Theor. Comput. Sci
, vol.1
, Issue.1
, pp. 1-116
-
-
Goldreich, O.1
-
11
-
-
85050160774
-
-
Shafi, G., Silvio, M.: Probabilistic encryption & how to play mental poker keeping secret all partial information. In: STOC 1982: Proceedings of the fourteenth annual ACM symposium on Theory of computing, pp. 365-377. ACM, New York (1982)
-
Shafi, G., Silvio, M.: Probabilistic encryption & how to play mental poker keeping secret all partial information. In: STOC 1982: Proceedings of the fourteenth annual ACM symposium on Theory of computing, pp. 365-377. ACM, New York (1982)
-
-
-
-
12
-
-
40249108370
-
-
Hazay, C., Lindell, Y.: Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 155-175. Springer, Heidelberg (2008)
-
Hazay, C., Lindell, Y.: Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008)
-
-
-
-
13
-
-
85028775577
-
Direct minimum knowledge computations
-
Pomerance, C, ed, CRYPTO 1987, Springer, Heidelberg
-
Impagliazzo, R., Yung, M.: Direct minimum knowledge computations. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 40-51. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 40-51
-
-
Impagliazzo, R.1
Yung, M.2
-
14
-
-
84955606093
-
Proving without knowing: On oblivious, agnostic and blindfolded provers
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Jakobsson, M., Yung, M.: Proving without knowing: On oblivious, agnostic and blindfolded provers. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 186-200. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 186-200
-
-
Jakobsson, M.1
Yung, M.2
-
15
-
-
70350656283
-
-
Jarecki, S., Liu, X.: Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection. In: TCC, pp. 577-594 (2009)
-
Jarecki, S., Liu, X.: Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection. In: TCC, pp. 577-594 (2009)
-
-
-
-
17
-
-
26444553355
-
-
Kiayias, A., Mitrofanova, A.: Testing disjointness of private datasets. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, 3570, pp. 109-124. Springer, Heidelberg (2005)
-
Kiayias, A., Mitrofanova, A.: Testing disjointness of private datasets. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 109-124. Springer, Heidelberg (2005)
-
-
-
-
18
-
-
33745160750
-
Privacy-preserving set operations
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Kissner, L., Song, D.X.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 241-257
-
-
Kissner, L.1
Song, D.X.2
-
20
-
-
38049136534
-
An efficient protocol for secure two-party computation in the presence of malicious adversaries
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Lindell, Y., Pinkas, B.: An efficient protocol for secure two-party computation in the presence of malicious adversaries. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 52-78. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 52-78
-
-
Lindell, Y.1
Pinkas, B.2
-
22
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
23
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612-613 (1979)
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
24
-
-
0020312165
-
Protocols for secure computations
-
Yao, A.C.-C.: Protocols for secure computations. In: FOCS, pp. 160-164 (1982)
-
(1982)
FOCS
, pp. 160-164
-
-
Yao, A.C.-C.1
-
25
-
-
0022882770
-
How to generate and exchange secrets (extended abstract)
-
Yao, A.C.-C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162-167 (1986)
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.C.-C.1
|