-
1
-
-
35048875418
-
Secure computation of the kth-ranked element
-
Springer-Verlag, Berlin
-
G. Aggarwal, N. Mishra, and B. Pinkas, "Secure computation of the kth-ranked element" Advances in Cryptology -EUROCRYPT'04, LNCS 3027, pp.40-55, Springer-Verlag, Berlin, 2004.
-
(2004)
Advances in Cryptology -EUROCRYPT'04, LNCS 3027
, pp. 40-55
-
-
Aggarwal, G.1
Mishra, N.2
Pinkas, B.3
-
2
-
-
0019532104
-
Untraceable electronic mail, return address, and digital pseudonyms
-
D.L. Chaum, "Untraceable electronic mail, return address, and digital pseudonyms," Commun. ACM, vol.24, no.2, pp.84-88, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.L.1
-
3
-
-
33846452218
-
Non-optimistic secure circuit evaluation based on ElGamal encryption and its applications
-
Jan.
-
K. Chida, G. Yamamoto, K. Suzuki, S. Uchiyama, N. Taniguchi, O. Shionoiri, and A. Kanai, "Non-optimistic secure circuit evaluation based on ElGamal encryption and its applications," IEICE Trans. Fundamentals, vol.E90-A, no.1, pp.128-138, Jan. 2007.
-
(2007)
IEICE Trans. Fundamentals
, vol.E90-A
, Issue.1
, pp. 128-138
-
-
Chida, K.1
Yamamoto, G.2
Suzuki, K.3
Uchiyama, S.4
Taniguchi, N.5
Shionoiri, O.6
Kanai, A.7
-
4
-
-
37149020412
-
Client/server tradeoffs for online elections
-
Springer-Verlag, Berlin
-
I. Damgård and M. Jurik, "Client/server tradeoffs for online elections," Public Key Cryptography 2002, LNCS 2274, pp. 125-140, Springer-Verlag, Berlin, 2002.
-
(2002)
Public Key Cryptography 2002, LNCS 2274
, pp. 125-140
-
-
Damgård, I.1
Jurik, M.2
-
5
-
-
85023809951
-
Threshold cryptosystems
-
Springer-Verlag, Berlin
-
Y. Desmedt and Y. Frankel, "Threshold cryptosystems," Advances in Cryptology -CRYPTO'89, LNCS 435, pp.307-315, Springer-Verlag, Berlin, 1990.
-
(1990)
Advances in Cryptology -CRYPTO'89, LNCS 435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
6
-
-
0023538330
-
A practical scheme for non-interactive verifiable secret sharing
-
IEEE Press, Los Alamitos
-
P. Feldman, "A practical scheme for non-interactive verifiable secret sharing," Proc. FOCS'87, pp.427-437, IEEE Press, Los Alamitos, 1987.
-
(1987)
Proc. FOCS'87
, pp. 427-437
-
-
Feldman, P.1
-
7
-
-
84937417083
-
Mix and match: Secure function evaluation via ciphertexts
-
Springer-Verlag, Berlin, 2000
-
M. Jakobsson and A. Juels, "Mix and match: Secure function evaluation via ciphertexts," Advances in Cryptology-ASIACRYPT'00, LNCS 1976, pp. 162-177, Springer-Verlag, Berlin, 2000.
-
(1976)
Advances in Cryptology-ASIACRYPT'00, LNCS
, pp. 162-177
-
-
Jakobsson, M.1
Juels, A.2
-
8
-
-
80555144158
-
(M + l)st-price auction protocol
-
Springer-Verlag, Berlin
-
H. Kikuchi, "(M + l)st-price auction protocol," Financial Cryptography 2001, LNCS 2339, pp.351-363, Springer-Verlag, Berlin, 2002.
-
(2002)
Financial Cryptography 2001, LNCS 2339
, pp. 351-363
-
-
Kikuchi, H.1
-
9
-
-
0003657590
-
-
Sorting and Searching, 2nd ed., Addison-Wesley, Reading, MA
-
D.E. Knuth, The Art of Computer Programming, vol.3, Sorting and Searching, 2nd ed., Addison-Wesley, Reading, MA, 1998.
-
(1998)
The Art of Computer Programming
, vol.3
-
-
Knuth, D.E.1
-
10
-
-
0141495795
-
-
Academic Press, San Diego
-
V. Krishna, Auction Theory, Academic Press, San Diego, 2002.
-
(2002)
Auction Theory
-
-
Krishna, V.1
-
11
-
-
84957041593
-
Bit-slice auction circuit
-
Springer-Verlag, Berlin
-
K. Kurosawa and W. Ogata, "Bit-slice auction circuit" ESORICS 2002, LNCS 2502, pp.24-38, Springer-Verlag, Berlin, 2002.
-
(2002)
ESORICS 2002, LNCS 2502
, pp. 24-38
-
-
Kurosawa, K.1
Ogata, W.2
-
12
-
-
85027159763
-
Cross tabulation protocol hiding individual information
-
Kyoto, Japan
-
G. Morohasni, K. Chida, K. Hirota, S. Tanimoto, O. Shionoiri, and A. Kanai, "Cross tabulation protocol hiding individual information," Proc. Computer Security Symposium 2006, Kyoto, Japan, 2006.
-
(2006)
Proc. Computer Security Symposium 2006
-
-
Morohasni, G.1
Chida, K.2
Hirota, K.3
Tanimoto, S.4
Shionoiri, O.5
Kanai, A.6
-
13
-
-
0035754862
-
A verifiable secret shuffle and its application to e-voting
-
ACM Press, New York, 2001
-
C.A. Neff, "A verifiable secret shuffle and its application to e-voting," Proc. ACM CCS 2001, pp. 116-125, ACM Press, New York, 2001.
-
(2001)
Proc. ACM CCS
, pp. 116-125
-
-
Neff, C.A.1
-
14
-
-
85027169772
-
Verifiable mixing (shuffling) of ElGamal pairs
-
VoteHere, Inc.
-
C.A. Neff, "Verifiable mixing (shuffling) of ElGamal pairs," VHTi Technical Document, http://www.votehere.net/vhti/documentation/egshuf.pdf, VoteHere, Inc., 2003.
-
(2003)
VHTi Technical Document
-
-
Neff, C.A.1
-
16
-
-
85027158725
-
Efficient anonymous channel and all/nothing election scheme
-
Springer-Verlag, Berlin
-
C. Park, K. Itoh, and K. Kurosawa, "Efficient anonymous channel and all/nothing election scheme," Advances in Cryptology-EUROCRYPT'93, LNCS 765, pp.248-259, Springer-Verlag, Berlin, 1994.
-
(1994)
Advances in Cryptology-EUROCRYPT'93, LNCS 765
, pp. 248-259
-
-
Park, C.1
Itoh, K.2
Kurosawa, K.3
-
17
-
-
0030123158
-
Generating statistical information in anonymous surveys
-
April
-
K. Sako, "Generating statistical information in anonymous surveys," IEICE Trans. Fundamentals, vol.E79-A, no.4, pp.507-512, April 1996.
-
(1996)
IEICE Trans. Fundamentals
, vol.E79-A
, Issue.4
, pp. 507-512
-
-
Sako, K.1
-
18
-
-
84957356080
-
Receipt-free mix-type voting scheme-A practical solution to the implementation of a voting booth
-
Springer-Verlag, Berlin
-
K. Sako and J. Kilian, "Receipt-free mix-type voting scheme-A practical solution to the implementation of a voting booth," Advances in Cryptology-EUROCRYPT'95, LNCS 921, pp.393-403, Springer-Verlag, Berlin, 1995.
-
(1995)
Advances in Cryptology-EUROCRYPT'95, LNCS 921
, pp. 393-403
-
-
Sako, K.1
Kilian, J.2
-
19
-
-
35048828873
-
Practical two-party computation based on the conditional gate
-
Springer-Verlag, Berlin
-
B. Schoenmakers and P. Tuyls, "Practical two-party computation based on the conditional gate," Advances in Cryptology-ASIACRYFT04, LNCS 3329, pp.119-136, Springer-Verlag, Berlin, 2004.
-
(2004)
Advances in Cryptology-ASIACRYFT04, LNCS 3329
, pp. 119-136
-
-
Schoenmakers, B.1
Tuyls, P.2
-
20
-
-
0020312165
-
Protocols for secure computations
-
IEEE Press, Los Alamitos
-
A.C. Yao, "Protocols for secure computations," Proc. FOCS'82, pp. 160-164, IEEE Press, Los Alamitos, 1982.
-
(1982)
Proc. FOCS'82
, pp. 160-164
-
-
Yao, A.C.1
|