메뉴 건너뛰기




Volumn 5645 LNCS, Issue , 2009, Pages 81-94

Practical private DNA string searching and matching through efficient oblivious automata evaluation

Author keywords

Cryptography; DNA matching; Privacy Preserving Protocols

Indexed keywords

DNA STRINGS; FINITE STATE MACHINES; MODULAR EXPONENTIATIONS; NEW PROTOCOL; NUMBER OF STATE; PRIVACY-PRESERVING PROTOCOLS; THREE ORDERS OF MAGNITUDE;

EID: 70350370031     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03007-9_6     Document Type: Conference Paper
Times cited : (36)

References (20)
  • 4
    • 84948952992 scopus 로고    scopus 로고
    • Minimal-latency secure function evaluation
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Beaver, D.: Minimal-latency secure function evaluation. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 335-350. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 335-350
    • Beaver, D.1
  • 5
    • 84974577749 scopus 로고    scopus 로고
    • One-round secure computation and secure autonomous mobile agents
    • Welzl, E, Montanari, U, Rolim, J.D.P, eds, ICALP 2000, Springer, Heidelberg
    • Cachin, C., Camenisch, J., Kilian, J., Müller, J.: One-round secure computation and secure autonomous mobile agents. In: Welzl, E., Montanari, U., Rolim, J.D.P. (eds.) ICALP 2000. LNCS, vol. 1853, p. 512. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1853 , pp. 512
    • Cachin, C.1    Camenisch, J.2    Kilian, J.3    Müller, J.4
  • 6
    • 1642602228 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Cachin, C., Micali, S., Stadler, M.: Computationally private information retrieval with polylogarithmic communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 402-414. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 7
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 143-202 (2000)
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 13
    • 24744472288 scopus 로고    scopus 로고
    • A proof of yao's protocol for secure two-party computation. Cryptology ePrint Archive
    • Report 2004/175
    • Lindell, Y., Pinkas, B.: A proof of yao's protocol for secure two-party computation. Cryptology ePrint Archive, Report 2004/175 (2004), http://eprint.iacr.org/
    • (2004)
    • Lindell, Y.1    Pinkas, B.2
  • 16
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.