-
2
-
-
84957610863
-
Proving in zero-knowledge that a number is the product of two safe primes
-
Stern, J. (ed.) Springer, Heidelberg
-
Camenisch, J., Michels, M.: Proving in zero-knowledge that a number is the product of two safe primes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 107-122. Springer, Heidelberg (1999).
-
(1999)
EUROCRYPT 1999. LNCS
, vol.1592
, pp. 107-122
-
-
Camenisch, J.1
Michels, M.2
-
3
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13 (2000).
-
(2000)
Journal of Cryptology
, vol.13
-
-
Canetti, R.1
-
4
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
ACM, New York
-
Chaum, D., Cŕepeau, C., Damgard, I.: Multiparty unconditionally secure protocols. In: STOC 1988: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, pp. 11-19. ACM, New York (1988).
-
(1988)
STOC 1988: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing
, pp. 11-19
-
-
Chaum, D.1
Cŕepeau, C.2
Damgard, I.3
-
5
-
-
79959318463
-
Multi-party privacy-preserving set intersection with quasi-linear complexity
-
Cheon, J.H., Jarecki, S., Seo, J.H.: Multi-party privacy-preserving set intersection with quasi-linear complexity. Cryptology ePrint Archive, Report 2010/512 (2010), http://eprint.iacr.org/.
-
(2010)
Cryptology EPrint Archive, Report 2010/512
-
-
Cheon, J.H.1
Jarecki, S.2
Seo, J.H.3
-
6
-
-
40249113229
-
Black-box construction of a non-malleable encryption scheme from any semantically secure one
-
Canetti, R. (ed.) Springer, Heidelberg
-
Choi, S., Dachman-Soled, D., Malkin, T., Wee, H.: Black-box construction of a non-malleable encryption scheme from any semantically secure one. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 427-444. Springer, Heidelberg (2008).
-
(2008)
TCC 2008. LNCS
, vol.4948
, pp. 427-444
-
-
Choi, S.1
Dachman-Soled, D.2
Malkin, T.3
Wee, H.4
-
7
-
-
78650834525
-
Linear-complexity private set intersection protocols secure in malicious model
-
Abe, M. (ed.) Springer, Heidelberg
-
De Cristofaro, E., Kim, J., Tsudik, G.: Linear-complexity private set intersection protocols secure in malicious model. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 213-231. Springer, Heidelberg (2010).
-
(2010)
ASIACRYPT 2010. LNCS
, vol.6477
, pp. 213-231
-
-
De Cristofaro, E.1
Kim, J.2
Tsudik, G.3
-
8
-
-
68949136946
-
Efficient robust private set intersection
-
Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) Springer, Heidelberg
-
Dachman-Soled, D., Malkin, T., Raykova,M., Yung,M.: Efficient robust private set intersection. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 125-142. Springer, Heidelberg (2009).
-
(2009)
ACNS 2009. LNCS
, vol.5536
, pp. 125-142
-
-
Dachman-Soled, D.1
Raykovam, M.T.2
Yung, M.3
-
9
-
-
79959287707
-
Multiparty secure computation over multivariate polynomials
-
Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Multiparty secure computation over multivariate polynomials. Technical Report CUCS-024-10 (2010).
-
(2010)
Technical Report CUCS- 024-10
-
-
Dachman-Soled, D.1
Malkin, T.2
Raykova, M.3
Yung, M.4
-
10
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Springer-Verlag New York, Inc., New York
-
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: CRYPTO 1984, pp. 10-18. Springer-Verlag New York, Inc., New York (1985).
-
(1985)
CRYPTO 1984
, pp. 10-18
-
-
Elgamal, T.1
-
12
-
-
84944328129
-
Sharing Decryption in the Context of Voting or Lotteries
-
Financial Cryptography
-
Fouque, P.A., Poupard, G., Stern, J.: Sharing decryption in the context of voting or lotteries. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 90-104. Springer, Heidelberg (2001). (Pubitemid 33359599)
-
(2001)
Lecture Notes in Computer Science
, Issue.1962
, pp. 90-104
-
-
Fouque, P.-A.1
Poupard, G.2
Stern, J.3
-
13
-
-
79956318201
-
Efficient and secure evaluation of multivariate polynomials and applications
-
Zhou, J., Yung, M. (eds.) Springer, Heidelberg
-
Franklin, M., Mohassel, P.: Efficient and secure evaluation of multivariate polynomials and applications. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 236-254. Springer, Heidelberg (2010).
-
(2010)
ACNS 2010. LNCS
, vol.6123
, pp. 236-254
-
-
Franklin, M.1
Mohassel, P.2
-
15
-
-
35048820609
-
Efficient private matching and set intersection
-
Cachin, C., Camenisch, J.L. (eds.) Springer, Heidelberg
-
Freedman, M., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004).
-
(2004)
EUROCRYPT 2004. LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.1
Nissim, K.2
Pinkas, B.3
-
16
-
-
84976655650
-
Cryptographic computation: Secure fault tolerant protocols and the public-key model
-
Pomerance, C. (ed.) Springer, Heidelberg
-
Galil, Z., Haber, S., Yung, M.: Cryptographic computation: Secure fault tolerant protocols and the public-key model. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 135-155. Springer, Heidelberg (1988).
-
(1988)
CRYPTO 1987. LNCS
, vol.293
, pp. 135-155
-
-
Galil, Z.1
Haber, S.2
Yung, M.3
-
17
-
-
33846862213
-
Secure distributed key generation for discrete-log based cryptosystems
-
DOI 10.1007/s00145-006-0347-3
-
Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. J. Cryptol. 20(1), 51-83 (2007). (Pubitemid 46224826)
-
(2007)
Journal of Cryptology
, vol.20
, Issue.1
, pp. 51-83
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
19
-
-
0023545076
-
How to play any mental game
-
ACM, New York
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: STOC 1987: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, pp. 218-229. ACM, New York (1987).
-
(1987)
STOC 1987: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
20
-
-
33646562165
-
Foundations of cryptography: A primer
-
Goldreich, O.: Foundations of cryptography: a primer. Found. Trends Theor. Comput. Sci. 1(1), 1-116 (2005).
-
(2005)
Found. Trends Theor. Comput. Sci.
, vol.1
, Issue.1
, pp. 1-116
-
-
Goldreich, O.1
-
22
-
-
40249108370
-
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
-
Canetti, R. (ed.) Springer, Heidelberg
-
Hazay, C., Lindell, Y.: Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti, R. (ed.) TCC. 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008).
-
(2008)
TCC. 2008. LNCS
, vol.4948
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
23
-
-
51849102397
-
Founding cryptography on oblivious transfer-efficiently
-
Wagner, D. (ed.) Springer, Heidelberg
-
Ishai, Y., Prabhakaran, M., Sahai, A.: Founding cryptography on oblivious transfer - efficiently. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 572-591. Springer, Heidelberg (2008).
-
(2008)
CRYPTO 2008. LNCS
, vol.5157
, pp. 572-591
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
-
24
-
-
70350677017
-
Secure arithmetic computation with no honest majority
-
Reingold, O. (ed.) Springer, Heidelberg
-
Ishai, Y., Prabhakaran, M., Sahai, A.: Secure arithmetic computation with no honest majority. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 294-314. Springer, Heidelberg (2009).
-
(2009)
TCC 2009. LNCS
, vol.5444
, pp. 294-314
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
-
25
-
-
70350656283
-
Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection
-
Reingold, O. (ed.) Springer, Heidelberg
-
Jarecki, S., Liu, X.: Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 577-594. Springer, Heidelberg (2009).
-
(2009)
TCC 2009. LNCS
, vol.5444
, pp. 577-594
-
-
Jarecki, S.1
Liu, X.2
-
26
-
-
33745160750
-
Privacy-preserving set operations
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005). (Pubitemid 43902117)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
27
-
-
33750199090
-
Oblivious polynomial evaluation
-
DOI 10.1137/S0097539704383633
-
Naor, M., Pinkas, B.: Oblivious polynomial evaluation. SIAM J. Comput. 35(5), 1254-1281 (2006). (Pubitemid 44599926)
-
(2006)
SIAM Journal on Computing
, vol.35
, Issue.5
, pp. 1254-1281
-
-
Naor, M.1
Pinkas, B.2
-
28
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J. (ed.) Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999).
-
(1999)
EUROCRYPT 1999. LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
29
-
-
70549091142
-
Information theoretically secure multi party set intersection re-visited
-
Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) Springer, Heidelberg
-
Patra, A., Choudhary, A., Rangan, C.: Information theoretically secure multi party set intersection re-visited. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 71-91. Springer, Heidelberg (2009).
-
(2009)
SAC 2009. LNCS
, vol.5867
, pp. 71-91
-
-
Patra, A.1
Choudhary, A.2
Rangan, C.3
-
30
-
-
77649259693
-
Round efficient unconditionally secure mpc and multiparty set intersection with optimal resilience
-
Roy, B., Sendrier, N. (eds.) Springer, Heidelberg
-
Patra, A., Choudhary, A., Rangan, C.P.: Round efficient unconditionally secure mpc and multiparty set intersection with optimal resilience. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 398-417. Springer, Heidelberg (2009).
-
(2009)
INDOCRYPT 2009. LNCS
, vol.5922
, pp. 398-417
-
-
Patra, A.1
Choudhary, A.2
Rangan, C.P.3
-
33
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612-613 (1979).
-
(1979)
Commun ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
34
-
-
0020312165
-
Protocols for secure computations
-
Yao, A.C.C.: Protocols for secure computations. In: FOCS, pp. 160-164 (1982).
-
(1982)
FOCS
, pp. 160-164
-
-
Yao, A.C.C.1
-
35
-
-
0022882770
-
How to generate and exchange secrets (extended abstract)
-
Yao, A.C.C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162-167 (1986)
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.C.C.1
|