-
1
-
-
69949124606
-
Randomizable proofs and delegatable anonymous creden-tials
-
Halevi, S. (ed.) Springer, Heidelberg
-
Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Randomizable proofs and delegatable anonymous creden-tials. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 108-125. Springer, Heidelberg (2009)
-
(2009)
CRYPTO 2009. LNCS
, vol.5677
, pp. 108-125
-
-
Belenkiy, M.1
Camenisch, J.2
Chase, M.3
Kohlweiss, M.4
Lysyanskaya, A.5
Shacham, H.6
-
2
-
-
20544449100
-
The one-more-rsa-inversion problems and the security of chaum's blind signature scheme
-
Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The one-more-rsa-inversion problems and the security of chaum's blind signature scheme. J. Cryptology 16(3), 185-215 (2003)
-
(2003)
J. Cryptology
, vol.16
, Issue.3
, pp. 185-215
-
-
Bellare, M.1
Namprempre, C.2
Pointcheval, D.3
Semanko, M.4
-
3
-
-
38049132285
-
Simulatable adaptive oblivious transfer
-
Naor, M. (ed.) Springer, Heidelberg
-
Camenisch, J., Neven, G., Shelat, A.: Simulatable adaptive oblivious transfer. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 573-590. Springer, Heidelberg (2007)
-
(2007)
EUROCRYPT 2007. LNCS
, vol.4515
, pp. 573-590
-
-
Camenisch, J.1
Neven, G.2
Shelat, A.3
-
4
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
Boneh, D. (ed.) Springer, Heidelberg
-
Camenisch, J., Shoup, V.: Practical verifiable encryption and decryption of discrete logarithms. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 126-144. Springer, Heidelberg (2003)
-
(2003)
CRYPTO 2003. LNCS
, vol.2729
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
5
-
-
24144485861
-
Efficient-out-of-oblivious transfer schemes with adaptive and non-adaptive queries
-
Vaudenay, S. (ed.) Springer, Heidelberg
-
Chu, C.-K., Tzeng, W.-G.: Efficient-out-of-oblivious transfer schemes with adaptive and non-adaptive queries. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 172-183. Springer, Heidelberg (2005)
-
(2005)
PKC 2005. LNCS
, vol.3386
, pp. 172-183
-
-
Chu, C.-K.1
Tzeng, W.-G.2
-
6
-
-
77955318017
-
Practical set intersection protocols with linear complexity
-
Sion, R. (ed.) Springer, Heidelberg
-
De Cristofaro, E., Tsudik, G.: Practical set intersection protocols with linear complexity. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 143-159. Springer, Heidelberg (2010)
-
FC 2010. LNCS
, vol.6052
, Issue.2010
, pp. 143-159
-
-
De Cristofaro, E.1
Tsudik, G.2
-
7
-
-
70350400269
-
Private intersection ofcertified sets
-
Dingledine, R., Golle, P. (eds.) Springer, Heidelberg
-
Camenisch, J., Zaverucha, G.M.: Private intersection ofcertified sets. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 108-127. Springer, Heidelberg (2009)
-
(2009)
FC 2009. LNCS
, vol.5628
, pp. 108-127
-
-
Camenisch, J.1
Zaverucha, G.M.2
-
8
-
-
68949136946
-
Efficient robust private set intersection
-
Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) Springer, Heidelberg
-
Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Efficient robust private set intersection. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 125-142. Springer, Heidelberg (2009)
-
(2009)
ACNS 2009. LNCS
, vol.5536
, pp. 125-142
-
-
Dachman-Soled, D.1
Malkin, T.2
Raykova, M.3
Yung, M.4
-
9
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
Evfimievski, A.V., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: PODS, pp. 211-222 (2003)
-
(2003)
PODS
, pp. 211-222
-
-
Evfimievski, A.V.1
Gehrke, J.2
Srikant, R.3
-
10
-
-
24144488603
-
Keyword search and oblivious pseudorandom functions
-
Kilian, J. (ed.) Springer, Heidelberg
-
Freedman, M.J., Ishai, Y., Pinkas, B., Reingold, O.: Keyword search and oblivious pseudorandom functions. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 303-324. Springer, Heidelberg (2005)
-
(2005)
TCC 2005. LNCS
, vol.3378
, pp. 303-324
-
-
Freedman, M.J.1
Ishai, Y.2
Pinkas, B.3
Reingold, O.4
-
11
-
-
35048820609
-
Efficient private matching and set intersection
-
Cachin, C., Camenisch, J.L. (eds.) Springer, Heidelberg
-
Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004. LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
12
-
-
40249108370
-
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
-
Canetti, R. (ed.) Springer, Heidelberg
-
Hazay, C., Lindell, Y.: Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008)
-
(2008)
TCC 2008. LNCS
, vol.4948
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
13
-
-
79955547393
-
Efficient set operations in the presence of malicious adversaries
-
Nguyen, P.Q., Pointcheval, D. (eds.) Springer, Heidelberg
-
Hazay, C., Nissim, K.: Efficient set operations in the presence of malicious adversaries. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 312-331. Springer, Heidelberg (2010)
-
PKC 2010. LNCS
, vol.6056
, Issue.2010
, pp. 312-331
-
-
Hazay, C.1
Nissim, K.2
-
14
-
-
70350656283
-
Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection
-
Reingold, O. (ed.) Springer, Heidelberg
-
Jarecki, S., Liu, X.: Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 577-594. Springer, Heidelberg (2009)
-
(2009)
TCC 2009. LNCS
, vol.5444
, pp. 577-594
-
-
Jarecki, S.1
Liu, X.2
-
16
-
-
84957096920
-
Oblivious transfer with adaptive queries
-
Wiener, M. (ed.) Springer, Heidelberg
-
Naor, M., Pinkas, B.: Oblivious transfer with adaptive queries. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 573-590. Springer, Heidelberg (1999)
-
(1999)
CRYPTO 1999. LNCS
, vol.1666
, pp. 573-590
-
-
Naor, M.1
Pinkas, B.2
-
17
-
-
1942420748
-
Oblivious keyword search
-
Ogata, W., Kurosawa, K.: Oblivious keyword search. J. Complexity 20(2-3), 356-371 (2004)
-
(2004)
J. Complexity
, vol.20
, Issue.2-3
, pp. 356-371
-
-
Ogata, W.1
Kurosawa, K.2
-
18
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J. (ed.) Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
EUROCRYPT 1999. LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
|