-
6
-
-
0032669864
-
Oblivious transfer and polynomial evaluation
-
(extended abstract). Atanta, GA, USA, May 1-4
-
M. Naor and B. Pinkas. Oblivious transfer and polynomial evaluation (extended abstract). In proceedings of the 31th ACM symposium on theory of Computing. pages 245-254, Atanta, GA, USA, May 1-4 1999.
-
(1999)
Proceedings of the 31th ACM Symposium on Theory of Computing
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
7
-
-
84958035648
-
Secure multiparty computational geometry
-
Providence, Rhode Island, USA, Ausust 8-10
-
Mikhail J. Atallah and W. Du. Secure multiparty computational geometry. In WADS2001: Seventh International WorLvhop on Algorithms and data Structures, pages 165-179, Providence, Rhode Island, USA, Ausust 8-10 2001.
-
(2001)
WADS2001: Seventh International WorLvhop on Algorithms and Data Structures
, pp. 165-179
-
-
Atallah, M.J.1
Du, W.2
-
9
-
-
84927517111
-
Privacy-Preserving Cooperative Statistical Analysis
-
W. Du and Mikhail J. Atallah. Privacy-Preserving Cooperative Statistical Analysis. In 2001 ACSAC: Annual Computer Security Applications Conference .December 10-14, 2001, New Orleans, Louisiana, USA. Pages 102-110.
-
2001 ACSAC: Annual Computer Security Applications Conference.December 10-14, 2001, New Orleans, Louisiana, USA
, pp. 102-110
-
-
Du, W.1
Atallah, M.J.2
-
10
-
-
20544447754
-
-
Ph.D. Thesis. Department of Computer Science and Applied Mathematics, The Weizmann lnstitiute of Science, Israel, Available from
-
Y. Lindell. On the Composition of Secure Multi-party Protocols. Ph.D. Thesis. Department of Computer Science and Applied Mathematics, The Weizmann lnstitiute of Science, Israel, 2002. Available from http://www.research.ibm.com/ people/1/.
-
(2002)
On the Composition of Secure Multi-party Protocols
-
-
Lindell, Y.1
-
11
-
-
0001090406
-
Computationally private information retrieval with polyogarithmic communication
-
Advances in cryptology: EUROCRYPT 1999
-
C. Cachin, S. Micali and M. Stadler. Computationally private information retrieval with polyogarithmic communication. Advances in cryptology: EUROCRYPT 1999. Lecture Notes in computer, Pages 308-318, 1998.
-
(1998)
Lecture Notes in Computer
, pp. 308-318
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
12
-
-
0030645563
-
Computationally private information retrieval
-
extended abstract
-
B. Chor and N. Gilboa. Computationally private information retrieval (extended abstract). In Proceedings of Twenty-ninth ACM Symposium on Theory of Computing, E1 Paso, Texas, USA, MAY 4-6 1997.
-
Proceedings of Twenty-ninth ACM Symposium on Theory of Computing, E1 Paso, Texas, USA, MAY 4-6 1997
-
-
Chor, B.1
Gilboa, N.2
-
16
-
-
84937422114
-
Distributed Oblivious Transfer
-
Advances in Cryptology - Asiacrypt '00 Proceedings, Springer-Verlag, December
-
M. Naor and B. Pinkas. Distributed Oblivious Transfer. Advances in Cryptology - Asiacrypt '00 Proceedings, LNCS 1976, Springer-Verlag, pp. 200-219,December 2000.
-
(2000)
LNCS 1976
, pp. 200-219
-
-
Naor, M.1
Pinkas, B.2
-
17
-
-
84957096920
-
Oblivious Transfer with adaptive queries
-
Advances in Cryptology - Crypto '99 Proceedings, springer-Veringer, August
-
M. Naor and B. Pinkas. Oblivious Transfer with adaptive queries. Advances in Cryptology - Crypto '99 Proceedings, Lncs 1666, springer-Veringer, pp. 573-590, August 1999.
-
(1999)
Lncs 1666
, pp. 573-590
-
-
Naor, M.1
Pinkas, B.2
-
19
-
-
77952926307
-
Secure Multi-Party Computation Made Simple
-
Third Conference on Security in Communication Networks, Springer-Verlag, Oct
-
Ueli Maurer. Secure Multi-Party Computation Made Simple. Third Conference on Security in Communication Networks, Lecture Notes in Computer Science, Springer-Verlag, Oct 2002.
-
(2002)
Lecture Notes in Computer Science
-
-
Maurer, U.1
-
21
-
-
85030121757
-
Equivalence between two flavors of oblivious transfers
-
Advances in Cryptology - CRYPTO 1987, Springer-Verlag
-
C. Crépeau. Equivalence between two flavors of oblivious transfers. In Advances in Cryptology - CRYPTO 1987, Lecture Notes in Computer Science, Volume 293, pages 350-354. Springer-Verlag, 1988.
-
(1988)
Lecture Notes in Computer Science
, vol.293
, pp. 50-354
-
-
Crépeau, C.1
-
24
-
-
77952941740
-
Unconditionally-Secure Oblivious Transfer
-
Feb.
-
Yang Bo, Chen Kai. Unconditionally-Secure Oblivious Transfer. Chinese Journal of Computers Feb.2003, Vol. 26. No. 2 202-205
-
(2003)
Chinese Journal of Computers
, vol.26
, Issue.2
, pp. 202-205
-
-
Bo, Y.1
Kai, C.2
-
25
-
-
77950612293
-
Research and Application of Secure Multi-party Computation Protocols
-
Li Qiang, Yah Hao Chen Ke-Fei. Research and Application of Secure Multi-party Computation Protocols. Chinese Journal of computer science. 2003 Vol.30 No. 8
-
(2003)
Chinese Journal of Computer Science
, vol.30
, Issue.8
-
-
Li, Q.1
Yah, H.2
Chen, K.-F.3
-
26
-
-
2942748384
-
A Protocol of Comparing Information Without Leaking
-
Qin J., Zhang Zhen-Feng, Feng Deng-Guo, Li Bao. A Protocol of Comparing Information Without Leaking. 2004 Journal of Software, Vol. 15, No.3
-
2004 Journal of Software
, vol.15
, Issue.3
-
-
Qin, J.1
Zhang, Z.-F.2
Feng, D.-G.3
Li, B.4
-
27
-
-
1542532126
-
Secure Two-party Scientific Computations
-
Luo Wenjun, Li Xiang. Secure Two-party Scientific Computations. Journal of Jishou University. Vol.24 No.4
-
Journal of Jishou University
, vol.24
, Issue.4
-
-
Luo, W.1
Li, X.2
-
28
-
-
23044442944
-
Two-directional Zero-Knowledge Proof and Secure Two-Party Computation
-
Luo Wenjun, Li Xiang.Two-directional Zero-Knowledge Proof and Secure Two-Party Computation. Journal of Guizhou University 2004, Vol.21 No. 1
-
(2004)
Journal of Guizhou University
, vol.21
, Issue.1
-
-
Luo, W.1
Li, X.2
-
29
-
-
77952914324
-
A Study of Secure Multi-party Scientific Computation Problem
-
Luo Wenjun, Li Xiang. A Study of Secure Multi-party Scientific Computation Problem. Chinacrypt'2004.
-
Chinacrypt'2004
-
-
Luo, W.1
Li, X.2
|