메뉴 건너뛰기




Volumn , Issue , 2009, Pages 133-136

Performance comparison of secure comparison protocols

Author keywords

Comparison protocols; Homomorphic encryption; Multiplicative hiding; Secret shares; Secure multiparty computation

Indexed keywords

E-COMMERCE; HOMOMORPHIC-ENCRYPTIONS; INPUT VALUES; PERFORMANCE COMPARISON; SECRET SHARING SCHEMES; SECURE MULTI-PARTY COMPUTATION;

EID: 73649111765     PISSN: 15294188     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DEXA.2009.37     Document Type: Conference Paper
Times cited : (53)

References (16)
  • 4
    • 0242496951 scopus 로고    scopus 로고
    • Secure Multi-party Computation Problems and their Applications: A Review and Open Problems
    • W. Du and M. J. Atallah, Secure Multi-party Computation Problems and their Applications: A Review and Open Problems, in proceedings of the New Security Paradigms Workshop (NSPW), pp. 12-21, 2001.
    • (2001) proceedings of the New Security Paradigms Workshop (NSPW) , pp. 12-21
    • Du, W.1    Atallah, M.J.2
  • 6
    • 24144477856 scopus 로고    scopus 로고
    • Secure Computation of the Mean and Related Statistics
    • proceedings of the 2nd Theory of Cryptography Conference TCC, Spring
    • E. Kiltz, G. Leander, and J. Malone-Lee, Secure Computation of the Mean and Related Statistics, in proceedings of the 2nd Theory of Cryptography Conference (TCC), Spring LNCS vol. 3378, pp. 283-302, 2005.
    • (2005) LNCS , vol.3378 , pp. 283-302
    • Kiltz, E.1    Leander, G.2    Malone-Lee, J.3
  • 7
    • 84867553981 scopus 로고    scopus 로고
    • A Generalization, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
    • proceedings of the 4th International Workshop of Practice and Theory in Public Key Cryptography PKC
    • I. Damgard and M. Jurik, A Generalization, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System, in proceedings of the 4th International Workshop of Practice and Theory in Public Key Cryptography (PKC), Springer LNCS vol. 1992, pp. 119-136, 2001.
    • (2001) Springer LNCS , vol.1992 , pp. 119-136
    • Damgard, I.1    Jurik, M.2
  • 8
    • 84942550998 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
    • proceedings of the International Conference on the Theory and Application of Cryptographic Techniques EUROCRYPT, Spring
    • P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, in proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT), Spring LNCS 1592, pp. 223-238, 1999.
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 9
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir, How to Share a Secret, Communications of the ACM, 22(11): 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 14
    • 73649123789 scopus 로고    scopus 로고
    • Available at Exclusive disjunction
    • Exclusive Disjunction, Available at http://en.wikipedia.org/wiki/ Exclusive disjunction.
    • Exclusive Disjunction
  • 15
    • 0000653210 scopus 로고    scopus 로고
    • Selecting Cryptographic Key Sizes
    • A. K. Lenstra and E. R. Verheul, Selecting Cryptographic Key Sizes, Journal of Cryptology, 14(4): 255293, 2001.
    • (2001) Journal of Cryptology , vol.14 , Issue.4 , pp. 255293
    • Lenstra, A.K.1    Verheul, E.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.