-
1
-
-
84958748475
-
Non-interactive distributed-verifier proofs and proving relations among commitments
-
Zheng, Y. (ed.) Springer, Heidelberg
-
Abe, M., Cramer, R., Fehr, S.: Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 206-223. Springer, Heidelberg (2002)
-
(2002)
ASIACRYPT 2002. LNCS
, vol.2501
, pp. 206-223
-
-
Abe, M.1
Cramer, R.2
Fehr, S.3
-
2
-
-
84937431456
-
Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
-
Yung, M. (ed.) Springer, Heidelberg
-
Algesheimer, J., Camenish, J., Shoup, V.: Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 417-432. Springer, Heidelberg (2002)
-
(2002)
CRYPTO 2002. LNCS
, vol.2442
, pp. 417-432
-
-
Algesheimer, J.1
Camenish, J.2
Shoup, V.3
-
3
-
-
64549086806
-
Secure Collaborative Planning, Forecasting, and Replenishment (SCPFR)
-
Atallah, M., Blanton, M., Deshpande, V., Frikken, K., Li, J., Schwarz, L.: Se-cure Collaborative Planning, Forecasting, and Replenishment (SCPFR). In: Multi-Echelon/Public Applications of Supply Chain Management Conference (2006)
-
(2006)
Multi-Echelon/Public Applications of Supply Chain Management Conference
-
-
Atallah, M.1
Blanton, M.2
Deshpande, V.3
Frikken, K.4
Li, J.5
Schwarz, L.6
-
4
-
-
0024940038
-
Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction
-
ACM, New York
-
Bar-Ilan, J., Beaver, D.: Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction. In: Proc. 8th ACM Symposium on Principles of Distributed Computing, pp. 201-209. ACM, New York (1989)
-
(1989)
Proc. 8th ACM Symposium on Principles of Distributed Computing
, pp. 201-209
-
-
Bar-Ilan, J.1
Beaver, D.2
-
5
-
-
84898960610
-
Completeness theorems for non-cryptographic fault tolerant distributed computation
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault tolerant distributed computation. In: Proc. of 20th ACM Sym-posium on Theory of Computing (STOC), pp. 1-10 (1988)
-
(1988)
Proc. of 20th ACM Sym-posium on Theory of Computing (STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
77955328311
-
Secure computation with fixed-point numbers
-
Sion, R. (ed.) Springer, Heidelberg
-
Catrina, O., Saxena, A.: Secure computation with fixed-point numbers. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 35-50. Springer, Heidelberg (2010)
-
FC 2010. LNCS
, vol.6052
, Issue.2010
, pp. 35-50
-
-
Catrina, O.1
Saxena, A.2
-
7
-
-
21144458613
-
Share conversion, pseudorandom secret-sharing and applications to secure computation
-
Kilian, J. (ed.) Springer, Heidelberg
-
Cramer, R., Damg°ard, I., Ishai, Y.: Share conversion, pseudorandom secret-sharing and applications to secure computation. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 342-362. Springer, Heidelberg (2005)
-
(2005)
TCC 2005. LNCS
, vol.3378
, pp. 342-362
-
-
Cramer, R.1
Damgard, I.2
Ishai, Y.3
-
8
-
-
84948975649
-
General secure multi-party computation from any linear secret-sharing scheme
-
Preneel, B. (ed.) Springer, Heidelberg
-
Cramer, R., Damg°ard, I., Maurer, U.: General Secure Multi-Party Computation from any Linear Secret-Sharing Scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 316-334. Springer, Heidelberg (2000)
-
(2000)
EUROCRYPT 2000. LNCS
, vol.1807
, pp. 316-334
-
-
Cramer, R.1
Damgard, I.2
Maurer, U.3
-
9
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
Pfitzmann, B. (ed.) Springer, Heidelberg
-
Cramer, R., Damg°ard, I., Nielsen, J.: Multiparty computation from threshold homomorphic encryption. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 280-300. Springer, Heidelberg (2001)
-
(2001)
EUROCRYPT 2001. LNCS
, vol.2045
, pp. 280-300
-
-
Cramer, R.1
Damgard, I.2
Nielsen, J.3
-
10
-
-
84957375076
-
A secure and optimally efficient multi-authority election scheme
-
Advances in Cryptology - Eurocrypt '97
-
Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103-118. Springer, Heidelberg (1997) (Pubitemid 127067797)
-
(1997)
LNCS
, Issue.1233
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
11
-
-
33745567199
-
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and ex-ponentiation
-
Halevi, S., Rabin, T. (eds.) Springer, Heidelberg
-
Damg°ard, I., Fitzi, M., Kiltz, E., Nielsen, J., Toft, T.: Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and ex-ponentiation. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 285-304. Springer, Heidelberg (2006)
-
(2006)
TCC 2006. LNCS
, vol.3876
, pp. 285-304
-
-
Damgard, I.1
Fitzi, M.2
Kiltz, E.3
Nielsen, J.4
Toft, T.5
-
12
-
-
33750056675
-
A practical implementation of secure auctions based on multiparty integer computation
-
Di Crescenzo, G., Rubin, A. (eds.) Springer, Heidelberg
-
Damg°ard, I., Nielsen, J., Toft, T., Pagter, J.I., Jakobsen, T., Bogetoft, P., Nielsen, K.: A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 142-147. Springer, Heidelberg (2006)
-
(2006)
FC 2006. LNCS
, vol.4107
, pp. 142-147
-
-
Damgard, I.1
Nielsen, J.2
Toft, T.3
Pagter, J.I.4
Jakobsen, T.5
Bogetoft, P.6
Nielsen, K.7
-
13
-
-
38049103274
-
Non-interactive proofs for integer multiplication
-
Naor, M. (ed.) Springer, Heidelberg
-
Damg°ard, I., Thorbek, R.: Non-interactive Proofs for Integer Multiplication. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 412-429. Springer, Heidelberg (2007)
-
(2007)
EUROCRYPT 2007. LNCS
, vol.4515
, pp. 412-429
-
-
Damgard, I.1
Thorbek, R.2
-
15
-
-
38049064946
-
Practical and secure solutions for integer comparison
-
Okamoto, T., Wang, X. (eds.) Springer, Heidelberg
-
Garay, J., Schoenmakers, B., Villegas, J.: Practical and Secure Solutions for Integer Comparison. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 330-342. Springer, Heidelberg (2007)
-
(2007)
PKC 2007. LNCS
, vol.4450
, pp. 330-342
-
-
Garay, J.1
Schoenmakers, B.2
Villegas, J.3
-
16
-
-
0031628398
-
Simplified VSS and fast-track multi-party computations with applications to threshold cryptography
-
Gennaro, R., Rabin, M., Rabin, T.: Simplified VSS and fast-track multi-party computations with applications to threshold cryptography. In: Proc. of ACM Sym-posium on Principles of Distributed Computing, PODC 1998 (1998)
-
(1998)
Proc. of ACM Sym-posium on Principles of Distributed Computing, PODC 1998
-
-
Gennaro, R.1
Rabin, M.2
Rabin, T.3
-
17
-
-
77955339189
-
Modulo reduction for paillier en-cryptions and application to secure statistical analysis
-
Sion, R. (ed.) Springer, Heidelberg
-
Guajardo, J., Mennink, B., Schoenmakers, B.: Modulo reduction for paillier en-cryptions and application to secure statistical analysis. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 375-382. Springer, Heidelberg (2010)
-
FC 2010. LNCS
, vol.6052
, Issue.2010
, pp. 375-382
-
-
Guajardo, J.1
Mennink, B.2
Schoenmakers, B.3
-
18
-
-
55549095165
-
Building a privacy-preserving benchmarking enterprise system
-
Kerschbaum, F.: Building a privacy-preserving benchmarking enterprise system. Enterp. Inf. Syst. 2(4), 421-441 (2008)
-
(2008)
Enterp. Inf. Syst.
, vol.2
, Issue.4
, pp. 421-441
-
-
Kerschbaum, F.1
-
19
-
-
38049034355
-
Multiparty computation for interval, equality, and com-parison without bit-decomposition protocol
-
Okamoto, T., Wang, X. (eds.) Springer, Heidelberg
-
Nishide, T., Ohta, K.: Multiparty Computation for Interval, Equality, and Com-parison Without Bit-Decomposition Protocol. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 343-360. Springer, Heidelberg (2007)
-
(2007)
PKC 2007. LNCS
, vol.4450
, pp. 343-360
-
-
Nishide, T.1
Ohta, K.2
-
21
-
-
33746092442
-
Efficient binary conversion for paillier encryptions
-
Vaudenay, S. (ed.) Springer, Heidelberg
-
Schoenmakers, B., Tuyls, P.: Efficient Binary Conversion for Paillier Encryptions. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 522-537. Springer, Heidelberg (2006)
-
(2006)
EUROCRYPT 2006. LNCS
, vol.4004
, pp. 522-537
-
-
Schoenmakers, B.1
Tuyls, P.2
-
22
-
-
77958036925
-
-
SecureSCM EU FP7 Project Secure Supply Chain Management, SecureSCM
-
SecureSCM. Security Analysis. Deliverable D9.2, EU FP7 Project Secure Supply Chain Management, SecureSCM (2009)
-
(2009)
Security Analysis. Deliverable D9.2
-
-
-
25
-
-
70350349546
-
Solving linear programs using multiparty computation
-
Dingledine, R., Golle, P. (eds.) Springer, Heidelberg
-
Toft, T.: Solving Linear Programs Using Multiparty Computation. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 90-107. Springer, Heidelberg (2009)
-
(2009)
FC 2009. LNCS
, vol.5628
, pp. 90-107
-
-
Toft, T.1
|