메뉴 건너뛰기




Volumn 6151 LNCS, Issue , 2010, Pages 154-163

Efficient generalized selective private function evaluation with applications in biometric authentication

Author keywords

BDD; biometric authentication; CPIR; cryptocomputing; selective private function evaluation

Indexed keywords

BDD; BIOMETRIC AUTHENTICATION; CPIR; CRYPTOCOMPUTING; SELECTIVE PRIVATE FUNCTION EVALUATION;

EID: 78650181766     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-16342-5_12     Document Type: Conference Paper
Times cited : (3)

References (12)
  • 1
    • 70350676688 scopus 로고    scopus 로고
    • Another Look at Extended Private Information Retrieval Protocols
    • Preneel, B. (ed.) AFRICACRYPT 2009 Springer, Heidelberg
    • Bringer, J., Chabanne, H.: Another Look at Extended Private Information Retrieval Protocols. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 305-322. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5580 , pp. 305-322
    • Bringer, J.1    Chabanne, H.2
  • 5
    • 84867553981 scopus 로고    scopus 로고
    • A Generalisation, A Simplification and Some Applications of Paillier's Probabilistic Public-Key System
    • Kim, K.-c. (ed.) PKC 2001 Springer, Heidelberg
    • Damgård, I., Jurik, M.: A Generalisation, A Simplification And Some Applications of Paillier's Probabilistic Public-Key System. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119-136. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.1992 , pp. 119-136
    • Damgård, I.1    Jurik, M.2
  • 6
    • 26444512068 scopus 로고    scopus 로고
    • Single-Database Private Information Retrieval with Constant Communication Rate
    • Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005 Springer, Heidelberg
    • Gentry, C., Ramzan, Z.: Single-Database Private Information Retrieval with Constant Communication Rate. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 803-815. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3580 , pp. 803-815
    • Gentry, C.1    Ramzan, Z.2
  • 7
    • 38049046515 scopus 로고    scopus 로고
    • Evaluating Branching Programs on Encrypted Data
    • Vadhan, S.P. (ed.) TCC 2007 Springer, Heidelberg
    • Ishai, Y., Paskin, A.: Evaluating Branching Programs on Encrypted Data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 575-594. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 575-594
    • Ishai, Y.1    Paskin, A.2
  • 8
    • 33745565439 scopus 로고    scopus 로고
    • Polylogarithmic Private Approximations and Efficient Matching
    • Halevi, S., Rabin, T. (eds.) TCC 2006 Springer, Heidelberg
    • Indyk, P., Woodruff, D.P.: Polylogarithmic Private Approximations and Efficient Matching. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 245- 264. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3876 , pp. 245-264
    • Indyk, P.1    Woodruff, D.P.2
  • 9
    • 33645970169 scopus 로고    scopus 로고
    • An Oblivious Transfer Protocol with Log-Squared Communication
    • Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005 Springer, Heidelberg
    • Lipmaa, H.: An Oblivious Transfer Protocol with Log-Squared Communication. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 314- 328. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3650 , pp. 314-328
    • Lipmaa, H.1
  • 10
    • 78650227109 scopus 로고    scopus 로고
    • How to Disassemble CPIR: First CPIR with Database-Dependent Computation
    • ICISC 2009, Seoul, Korea, December 2-4 Springer, Heidelberg
    • Lipmaa, H.: How to Disassemble CPIR: First CPIR with Database-Dependent Computation. In: ICISC 2009, Seoul, Korea, December 2-4. LNCS. Springer, Heidelberg (2009)
    • (2009) LNCS
    • Lipmaa, H.1
  • 11
    • 38049016843 scopus 로고    scopus 로고
    • A New Protocol for Conditional Disclosure of Secrets and Its Applications
    • Katz, J., Yung, M. (eds.) ACNS 2007 Springer, Heidelberg
    • Laur, S., Lipmaa, H.: A New Protocol for Conditional Disclosure of Secrets And Its Applications. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 207-225. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4521 , pp. 207-225
    • Laur, S.1    Lipmaa, H.2
  • 12
    • 0031338276 scopus 로고    scopus 로고
    • Efficient Oblivious Branching Programs for Threshold and Mod Functions
    • Sinha, R.K., Thathachar, J.S.: Efficient Oblivious Branching Programs for Threshold And Mod Functions. Journal of Computer and System Sciences 55(3), 373-384 (1997)
    • (1997) Journal of Computer and System Sciences , vol.55 , Issue.3 , pp. 373-384
    • Sinha, R.K.1    Thathachar, J.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.