-
1
-
-
35048875418
-
Secure computation of the kth-Ranked element
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Aggarwal, G., Mishra, N., Pinkas, B.: Secure Computation of the kth-Ranked Element. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 40-55. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 40-55
-
-
Aggarwal, G.1
Mishra, N.2
Pinkas, B.3
-
2
-
-
38049082907
-
Security against covert adversaries: Efficient protocols for realistic adversaries
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Aumann, Y., Lindell, Y.: Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137-156. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 137-156
-
-
Aumann, Y.1
Lindell, Y.2
-
3
-
-
0040198183
-
Balanced allocations
-
Azar, Y., Broder, A.Z., Karlin, A.R., Upfal, E.: Balanced Allocations. SIAM Journal on Computing 29(1), 180-200 (1999) (Pubitemid 30588356)
-
(2000)
SIAM Journal on Computing
, vol.29
, Issue.1
, pp. 180-200
-
-
Azar, Y.1
Broder, A.Z.2
Karlin, A.R.3
Upfal, E.4
-
4
-
-
84898960610
-
Completeness theorems for non cryptographic fault tolerant distributed computations
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non cryptographic fault tolerant distributed computations. In: 20th STOC, pp. 1-10 (1988)
-
(1988)
20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
-
Boneh, D., Goh, E., Nissim, K.: Evaluating 2-DNF Formulas on Ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005) (Pubitemid 41231172)
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
6
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols. In: 20th STOC, pp. 11-19 (1988)
-
(1988)
20th STOC
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
7
-
-
85001025766
-
Wallet databases with observers
-
Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
-
Chaum, D., Pedersen, T.P.: Wallet Databases with Observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89-105. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
8
-
-
84948970500
-
Efficient concurrent zero-knowledge in the auxiliary string model
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Damgård, I.: Efficient Concurrent Zero-Knowledge in the Auxiliary String Model. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 418-430. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 418-430
-
-
Damgård, I.1
-
9
-
-
84867553981
-
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
-
Public Key Cryptography
-
Damgård, I., Jurik, M.: A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119-136. Springer, Heidelberg (2001) (Pubitemid 33232937)
-
(2001)
Lecture Notes in Computer Science
, Issue.1992
, pp. 119-136
-
-
Damgard, I.1
Jurik, M.2
-
10
-
-
84937437506
-
Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor
-
Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
-
Damgård, I., Nielsen, J.B.: Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 3-42. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 3-42
-
-
Damgård, I.1
Nielsen, J.B.2
-
11
-
-
68949136946
-
Efficient robust private set intersection
-
Ghilardi, S. (ed.) ANCS 2009. Springer, Heidelberg
-
Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Efficient Robust Private Set Intersection. In: Ghilardi, S. (ed.) ANCS 2009. LNCS, vol. 5479, pp. 125-142. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 125-142
-
-
Dachman-Soled, D.1
Malkin, T.2
Raykova, M.3
Yung, M.4
-
12
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10-18. Springer, Heidelberg (1984)
-
(1984)
LNCS
, vol.196
, pp. 10-18
-
-
El Gamal, T.1
-
13
-
-
33748996753
-
Secure multiparty computation of approximations
-
DOI 10.1145/1159892.1159900
-
Feigenbaum, J., Ishai, Y., Malkin, T., Nissim, K., Strauss, M.J., Wright, R.N.: Secure multiparty computation of approximations. ACM Transactions on Algorithms (TALG) 2(3), 435-472 (2006) (Pubitemid 44452181)
-
(2006)
ACM Transactions on Algorithms
, vol.2
, Issue.3
, pp. 435-472
-
-
Feigenbaum, J.1
Ishai, Y.2
Malkin, T.A.L.3
Nissim, K.4
Strauss, M.J.5
Wright, R.N.6
-
14
-
-
33745129227
-
Threshold cryptosystems secure against chosenciphertext attacks
-
Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
-
Fouque, P., Pointcheval, D.: Threshold cryptosystems secure against chosenciphertext attacks. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 573-584. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 573-584
-
-
Fouque, P.1
Pointcheval, D.2
-
15
-
-
84944328129
-
Sharing decryption in the context of voting of lotteries
-
Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg
-
Fouque, P., Poupard, G., Stern, J.: Sharing decryption in the context of voting of lotteries. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 90-104. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5628
, pp. 90-104
-
-
Fouque, P.1
Poupard, G.2
Stern, J.3
-
16
-
-
24144488603
-
Keyword search and oblivious pseudorandom functions
-
Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
-
Freedman, M.J., Ishai, Y., Pinkas, B., Reingold, O.: Keyword Search and Oblivious Pseudorandom Functions. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 303-324. Springer, Heidelberg (2005) (Pubitemid 41231171)
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 303-324
-
-
Freedman, M.J.1
Ishai, Y.2
Pinkas, B.3
Reingold, O.4
-
17
-
-
35048820609
-
Efficient private matching and set-intersection
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Freedman, M., Nissim, K., Pinkas, B.: Efficient Private Matching and Set-Intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.1
Nissim, K.2
Pinkas, B.3
-
19
-
-
0000108216
-
How to construct constant-round zero-knowledge proof systems for NP
-
Goldreich, O., Kahan, A.: How To Construct Constant-Round Zero-Knowledge Proof Systems for NP. Journal of Cryptology 9(3), 167-190 (1996)
-
(1996)
Journal of Cryptology
, vol.9
, Issue.3
, pp. 167-190
-
-
Goldreich, O.1
Kahan, A.2
-
20
-
-
0023545076
-
How to play any mental game
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: 19th STOC, pp. 218-229 (1987)
-
(1987)
19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
21
-
-
40249108370
-
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
-
Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
-
Hazay, C., Lindell, Y.: Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
22
-
-
79955546157
-
Efficient set operations in the presence of malicious adversaries
-
Hazay, C., Nissim, K.: Efficient Set Operations in the Presence of Malicious Adversaries. Cryptology ePrint Archive, Report 2009/594 (2009), http://eprint.iacr.org/
-
(2009)
Cryptology EPrint Archive, Report 2009/594
-
-
Hazay, C.1
Nissim, K.2
-
23
-
-
70350656283
-
Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Jarecki, S., Liu, X.: Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 577-594. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 577-594
-
-
Jarecki, S.1
Liu, X.2
-
24
-
-
38049077335
-
Secure linear algebra using linearly recurrent sequences
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Kiltz, E., Mohassel, P., Weinreb, E., Franklin, M.K.: Secure Linear Algebra Using Linearly Recurrent Sequences. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 291-310. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 291-310
-
-
Kiltz, E.1
Mohassel, P.2
Weinreb, E.3
Franklin, M.K.4
-
25
-
-
33745160750
-
Privacy-preserving set operations
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
Kissner, L., Song, D.X.: Privacy-Preserving Set Operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005); See technical report CMU-CS-05-113 for the full version (Pubitemid 43902117)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621 LNCS
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
26
-
-
33746437508
-
Privacy preserving data mining
-
DOI 10.1007/s00145-001-0019-2
-
Lindell, Y., Pinkas, B.: Privacy Preserving Data Mining. Journal of Cryptology 15(3), 177-206 (2002) (Pubitemid 44126466)
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
27
-
-
52049092094
-
Efficient secure linear algebra in the presence of covert or computationally unbounded adversaries
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Mohassel, P.,Weinreb, E.: Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 481-496. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 481-496
-
-
Mohassel, P.1
Weinreb, E.2
-
29
-
-
40249087763
-
Number-theoretic constructions of ecient pseudo-random functions
-
Naor, M., Reingold, O.: Number-Theoretic Constructions of Ecient Pseudo-Random Functions. In: 38th FOCS, pp. 231-262 (1997)
-
(1997)
38th FOCS
, pp. 231-262
-
-
Naor, M.1
Reingold, O.2
-
30
-
-
33745558215
-
Communication efficient secure linear algebra
-
DOI 10.1007/11681878-27, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
Nissim, K., Weinreb, E.: Communication Efficient Secure Linear Algebra. In: 4th TCC, pp. 522-541 (2006) (Pubitemid 43979866)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3876 LNCS
, pp. 522-541
-
-
Nissim, K.1
Weinreb, E.2
-
31
-
-
84875762817
-
Provably secure and practical identification schemes and corresponding signature schemes
-
Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
-
Okamoto, T.: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31-53. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 31-53
-
-
Okamoto, T.1
-
32
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
33
-
-
84982943258
-
Non-interactive and information-theoretical secure verifiable secret sharing
-
Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
-
Pedersen, T.P.: Non-Interactive and Information-Theoretical Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129-140. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
34
-
-
51849126892
-
A framework for efficient and composable oblivious transfer
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Peikert, C., Vaikuntanathan, V., Waters, B.: A Framework for Efficient and Composable Oblivious Transfer. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 554-571. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 554-571
-
-
Peikert, C.1
Vaikuntanathan, V.2
Waters, B.3
-
35
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
-
Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239-252. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 239-252
-
-
Schnorr, C.P.1
-
36
-
-
33244463908
-
How asymmetry helps load balancing
-
DOI 10.1145/792538.792546
-
Vocking, B.: How Asymmetry Helps Load Balancing. Journal of the ACM 50(4), 568-589 (2003) (Pubitemid 43906338)
-
(2003)
Journal of the ACM
, vol.50
, Issue.4
, pp. 568-589
-
-
Vocking, B.1
-
37
-
-
0020312165
-
Protocols for secure computations
-
Yao, A.C.: Protocols for secure computations. In: 23rd FOCS, pp. 160-164 (1982)
-
(1982)
23rd FOCS
, pp. 160-164
-
-
Yao, A.C.1
|