-
2
-
-
35048875418
-
Secure computation of the 8th-ranked element
-
Springer, Berlin
-
AGGARWAL, G., MISHRA, N., AND PINKAS, B. 2004. Secure computation of the 8th-ranked element. In Proceedings of Advances in Cryptology (EUROCRYPT'04). Springer, Berlin, 40-55.
-
(2004)
Proceedings of Advances in Cryptology (EUROCRYPT'04)
, pp. 40-55
-
-
Aggarwal, G.1
Mishra, N.2
Pinkas, B.3
-
3
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Springer, Berlin
-
BARRETO, P., KIM, H., LYNN, B., AND SCOTT, M. 2002. Efficient algorithms for pairing-based cryptosystems. In Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'02). Springer, Berlin, 354-369.
-
(2002)
Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'02)
, pp. 354-369
-
-
Barreto, P.1
Kim, H.2
Lynn, B.3
Scott, M.4
-
4
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
BONEH, D. AND FRANKLIN, M. 2003. Identity-based encryption from the Weil pairing. SIAM J. Comput. 32, 3, 586-615.
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
Springer, Berlin
-
BONEH, D., GOH, E., AND NISSIM, K. 2005. Evaluating 2-DNF formulas on ciphertexts. In Proceedings of the 2nd Theory of Cryptography Conference (TCC'05). Springer, Berlin, 325-341.
-
(2005)
Proceedings of the 2nd Theory of Cryptography Conference (TCC'05)
, pp. 325-341
-
-
Boneh, D.1
Goh, E.2
Nissim, K.3
-
7
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
Springer, Berlin
-
CRAMER, R., DAMGARD, I., AND NIELSEN, J. 2001. Multiparty computation from threshold homomorphic encryption. In Proceedings of Advances in Cryptology (EUROCRYPT'01). Springer, Berlin, 280-300.
-
(2001)
Proceedings of Advances in Cryptology (EUROCRYPT'01)
, pp. 280-300
-
-
Cramer, R.1
Damgard, I.2
Nielsen, J.3
-
8
-
-
0031628726
-
Robust efficient distributed RSA-key generation
-
ACM, New York
-
FRANKEL, Y.,MACKENZIE, P., AND YUNG,M. 1998. Robust efficient distributed RSA-key generation. In Proceedings of the 17th Annual ACM Symposium on Principles of Distributed Computing. ACM, New York, 320-330.
-
(1998)
Proceedings of the 17th Annual ACM Symposium on Principles of Distributed Computing
, pp. 320-330
-
-
Frankel, Y.1
Mackenzie, P.2
Yung, M.3
-
9
-
-
35048820609
-
Efficient private matching and set intersection
-
Springer, Berlin
-
FREEDMAN, M., NISSIM, K., AND PINKAS, B. 2004. Efficient private matching and set intersection. In Proceedings of Advances in Cryptology (ERUROCRYPT'04). Springer, Berlin, 1-19.
-
(2004)
Proceedings of Advances in Cryptology (ERUROCRYPT'04)
, pp. 1-19
-
-
Freedman, M.1
Nissim, K.2
Pinkas, B.3
-
11
-
-
33646768523
-
Elliptic curve paillier schemes
-
GALBRAITH, S. D. 2002. Elliptic curve paillier schemes. J. Cryptology 15, 2,129-138.
-
(2002)
J. Cryptology
, vol.15
, Issue.2
, pp. 129-138
-
-
Galbraith, S.D.1
-
12
-
-
0003979335
-
-
Cambridge University Press, Cambridge, UK
-
GOLDREICH, O. 2004. Foundations of Cryptography, vol.2. Cambridge University Press, Cambridge, UK.
-
(2004)
Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
13
-
-
0023545076
-
How to play any mental game
-
ACM, New York
-
GOLDREICH, O., MICALI, S., AND WIGDERSON, A. 1987. How to play any mental game. In Proceedings of the 19th Annual ACM Symposium on the Theory of Computing (STOC'87). ACM, New York, 218-229.
-
(1987)
Proceedings of the 19th Annual ACM Symposium on the Theory of Computing (STOC'87)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
14
-
-
33746045515
-
Perfect non-interactive zero-knowledge for NP
-
Springer, Berlin
-
GROTH, J., OSTROVSKY, R., AND SAHAI, A. 2006. Perfect non-interactive zero-knowledge for NP. In Proceedings of Advances in Cryptology (EUROCRYPT'06). Springer, Berlin, 338-359.
-
(2006)
Proceedings of Advances in Cryptology (EUROCRYPT'06)
, pp. 338-359
-
-
Groth, J.1
Ostrovsky, R.2
Sahai, A.3
-
19
-
-
84976699318
-
The Byzantine generals problem
-
LAMPORT, L., SHOSTACK, R., AND PEASE, M. 1982. The Byzantine generals problem. ACM Trans. Program. Lang. Syst. 4, 3,382-401.
-
(1982)
ACM Trans. Program. Lang. Syst.
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostack, R.2
Pease, M.3
-
21
-
-
4544235438
-
Parallel coin-tossing and constant-round secure two-party computation
-
LINDELL, Y. 2003. Parallel coin-tossing and constant-round secure two-party computation. J. Cryptology 16, 3, 143-184.
-
(2003)
J. Cryptology
, vol.16
, Issue.3
, pp. 143-184
-
-
Lindell, Y.1
-
22
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
MENEZES, A., VANSTONE, S., AND OKAMOTO, T. 1993. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inf. Theory 39, 5,1639-1646.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.5
, pp. 1639-1646
-
-
Menezes, A.1
Vanstone, S.2
Okamoto, T.3
-
23
-
-
84944878354
-
-
CRCPress, Boca Raton, FL
-
MENEZES, A.,OORSCHOT, P., ANDVANSTONE, S. 1996. Handbook of Applied Cryptography.CRCPress, Boca Raton, FL.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Oorschot, P.2
Andvanstone, S.3
-
24
-
-
22144445920
-
The Weil pairing, and its efficient calculation
-
MILLER, V. 2004. The Weil pairing, and its efficient calculation. J. Cryptology 17, 4, 235-261.
-
(2004)
J. Cryptology
, vol.17
, Issue.4
, pp. 235-261
-
-
Miller, V.1
-
25
-
-
33745868262
-
Efficient polynomial operations in the shared-coefficients setting
-
Springer, Berlin
-
MOHASSEL, P. AND FRANKLIN, M. 2006. Efficient polynomial operations in the shared-coefficients setting. In Proceedings of Public Key Cryptography (PKC'06). Springer, Berlin, 44-57.
-
(2006)
Proceedings of Public Key Cryptography (PKC'06)
, pp. 44-57
-
-
Mohassel, P.1
Franklin, M.2
-
28
-
-
41549104640
-
Efficient protocols for privacy preserving matching against distributed datasets
-
Springer, Berlin
-
SANG, Y., SHEN, H., TAN, Y., AND XIONG,N. 2006. Efficient protocols for privacy preserving matching against distributed datasets. In Proceedings of the 8th International Conference on Information and Communications Security (ICICS'06). Springer, Berlin, 210-227.
-
(2006)
Proceedings of the 8th International Conference on Information and Communications Security (ICICS'06)
, pp. 210-227
-
-
Sang, Y.1
Shen, H.2
Tan, Y.3
Xiong, N.4
-
29
-
-
48049104079
-
Privacy preserving set intersection protocol secure against malicious behaviors
-
IEEE, Los Alamitos, CA
-
SANG, Y. AND SHEN, H. 2007. Privacy preserving set intersection protocol secure against malicious behaviors. In Proceedings of the 8th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'07). IEEE, Los Alamitos, CA.
-
(2007)
Proceedings of the 8th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'07)
-
-
Sang, Y.1
Shen, H.2
-
30
-
-
72449135459
-
Privacy preserving set intersection protocols based on bilinear groups
-
Austrailian Computer Society, West Melbourne, Australia
-
SANG, Y. AND SHEN, H. 2008. Privacy preserving set intersection protocols based on bilinear groups. In Proceedings of the 31st Australasian Computer Science Conference (ACSC'08). Austrailian Computer Society, West Melbourne, Australia.
-
(2008)
Proceedings of the 31st Australasian Computer Science Conference (ACSC'08)
-
-
Sang, Y.1
Shen, H.2
-
31
-
-
72449175445
-
Analysis of privacy-preserving element reduction of multiset
-
SEO, J., YOON, H., CHEON, J., AND HONG, D. 2006. Analysis of privacy-preserving element reduction of multiset. Cryptology ePrint Archive: Report 2006/418. http://eprint.iacr.org/2006/418.
-
(2006)
Cryptology EPrint Archive: Report 2006/418
-
-
Seo, J.1
Yoon, H.2
Cheon, J.3
Hong, D.4
-
32
-
-
0018545449
-
How to share a secret
-
SHAMIR, A. 1979. How to share a secret. Comm. ACM 22, 11, 612-613.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|