-
1
-
-
84945134014
-
Priced Oblivious Transfer: How to Sell Digital Goods
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
AIELLO, W., ISHAI, Y., AND REINGOLD, O. 2001. Priced oblivious transfer: How to sell digital goods. In Advances in Cryptology (EUROCRYPT'01), Lecture Notes in Computer Science, vol. 2045, Springer, Berlin, 119-135. (Pubitemid 33275828)
-
(2001)
Lecture Notes In Computer Science
, Issue.2045
, pp. 119-135
-
-
Aiello, B.1
Ishai, Y.2
Reingold, O.3
-
2
-
-
79959844386
-
Secure computer system: Unified exposition and Multics interpretation
-
Bedford, MA
-
BELL, D. E. AND PADULA, L. J. L. 1988. Secure computer system: Unified exposition and Multics interpretation. MITRE Corp., Bedford, MA.
-
(1988)
MITRE Corp
-
-
Bell, D.E.1
Padula, L.J.L.2
-
4
-
-
35048846561
-
Strong conditional oblivious transfer and computing on intervals
-
BLAKE, I. F. AND KOLESNIKOV, V. 2004. Strong Conditional Oblivious Transfer and Computing on Intervals. In Advances in Cryptology (ASIACRYPT'04), Lecture Notes in Computer Science, vol. 3329, Springer, Berlin, 515-529. (Pubitemid 39747776)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3329
, pp. 515-529
-
-
Blake, I.F.1
Kolesnikov, V.2
-
5
-
-
35048848152
-
Short signatures without random oracles
-
Lecture Notes in Computer Science, Springer, Berlin
-
BONEH, D. AND BOYEN, X. 2004. Short signatures without random oracles. In Advances in Cryptology (EUROCRYPT'04), Lecture Notes in Computer Science, vol. 3027, Springer, Berlin, 56-73.
-
(2004)
Advances in Cryptology (EUROCRYPT'04)
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
6
-
-
35048887476
-
Short group signatures
-
Lecture Notes in Computer Science, Springer, Berlin
-
BONEH, D.,BOYEN, X., AND SHACHAM,H. 2004. Short group signatures. In Advances in Cryptology (CRYPTO'04), Lecture Notes in Computer Science, vol. 3152, Springer, Berlin, 227-242.
-
(2004)
Advances in Cryptology (CRYPTO'04)
, vol.3152
, pp. 227-242
-
-
Boneh D.Boyen, X.1
Shacham, H.2
-
7
-
-
84948973732
-
Efficient proofs that a committed number lies in an interval
-
Lecture Notes in Computer Science, Springer, Berlin
-
BOUDOT, F. 2000. Efficient proofs that a committed number lies in an interval. In Advances in Cryptology (EUROCRYPT'00), Lecture Notes in Computer Science, vol. 1807, Springer, Berlin, 431-444.
-
(2000)
Advances in Cryptology (EUROCRYPT'00)
, vol.1807
, pp. 431-444
-
-
Boudot, F.1
-
8
-
-
84957366640
-
Rapid demonstration of linear relations connected by boolean operators
-
Advances in Cryptology - Eurocrypt '97
-
BRANDS, S. 1997. Rapid demonstration of linear relations connected by boolean operators. In Advances in Cryptology (EUROCRYPT'97), Lecture Notes in Computer Science, vol. 1233. Springer, Berlin, 318-333. (Pubitemid 127067810)
-
(1997)
Lecture Notes in Computer Science
, Issue.1233
, pp. 318-333
-
-
Brands, S.1
-
9
-
-
0024663219
-
TheChineseWall security policy
-
IEEE, Los Alamitos, CA
-
BREWER, D. F. C. ANDNASH,M. J. 1989. TheChineseWall security policy. In Proceedings of the IEEESymposium on Security and Privacy. IEEE, Los Alamitos, CA, 206-214.
-
(1989)
Proceedings of the IEEESymposium on Security and Privacy
, pp. 206-214
-
-
Brewer, D.F.C.1
Andnash, M.J.2
-
10
-
-
84937441148
-
Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes
-
Lecture Notes in Computer Science
-
CAMENISCH, J. AND DAMGARD, I. 2000. Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. In Advances in Cryptology (ASIACRYPT '00), Lecture Notes in Computer Science, vol. 1976, 331-345.
-
(2000)
Advances in Cryptology (ASIACRYPT '00)
, vol.1976
, pp. 331-345
-
-
Camenisch, J.1
Damgard, I.2
-
11
-
-
74049137084
-
Oblivious transfer with access controls
-
ACM, New York
-
CAMENISCH, J., DUBOVITSKAYA, M., AND NEVEN, G. 2009. Oblivious transfer with access controls. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09). ACM, New York, 131-140.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09)
, pp. 131-140
-
-
Camenisch, J.1
Dubovitskaya, M.2
Neven, G.3
-
12
-
-
77955331156
-
Unlinkable priced oblivious transfer with rechargeable wallets
-
Lecture Notes in Computer Science, Springer, Berlin
-
CAMENISCH, J., DUBOVITSKAYA, M., AND NEVEN, G. 2010. Unlinkable priced oblivious transfer with rechargeable wallets. In Financial Cryptography and Data Security, Lecture Notes in Computer Science, vol. 6052, Springer, Berlin.
-
(2010)
Financial Cryptography and Data Security
, vol.6052
-
-
Camenisch, J.1
Dubovitskaya, M.2
Neven, G.3
-
13
-
-
34547379480
-
How to win the clonewars: Efficient periodic n-times anonymous authentication
-
DOI 10.1145/1180405.1180431, 1180431, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
CAMENISCH, J.,HOHENBERGER, S.,KOHLWEISS,M.,LYSYANSKAYA, A., ANDMEYEROVICH,M. 2006. How towin the clone wars: Efficient periodic n-times anonymous authentication. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06). ACM, New York, 201-210. (Pubitemid 47131369)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 201-210
-
-
Camenisch, J.1
Hohenberger, S.2
Kohlweiss, M.3
Lysyanskaya, A.4
Meyerovich, M.5
-
14
-
-
24944435537
-
Compact e-cash
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
CAMENISCH, J., HOHENBERGER, S., AND LYSYANSKAYA, A. 2005. Compact e-cash. In Advances in Cryptology (EUROCRYPT'05), Lecture Notes in Computer Science, vol. 3494, Springer, Berlin, 302-321. (Pubitemid 41313960)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
15
-
-
33750024803
-
Balancing accountability and privacy using E-cash
-
Security and Cryptography for Networks - 5th International Conference, SCN 2006, Proceedings
-
CAMENISCH, J.,HOHENBERGER, S., AND LYSYANSKAYA, A. 2006. Balancing accountability and privacy using e-cash. In Security and Cryptography for Networks, Lecture Notes in Computer Science, vol. 4116, Springer, Berlin, 141-155. (Pubitemid 44568296)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS4116
, pp. 141-155
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
16
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
CAMENISCH, J. AND LYSYANSKAYA, A. 2001. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In Advances in Cryptology (EUROCRYPT'01), Lecture Notes in Computer Science, vol. 2045, Springer, Berlin, 93-118. (Pubitemid 33275827)
-
(2001)
Lecture Notes in Computer Science
, Issue.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
17
-
-
35248839965
-
A signature scheme with efficient protocols
-
Lecture Notes in Computer Science, Springer, Berlin
-
CAMENISCH, J. AND LYSYANSKAYA, A. 2003. A signature scheme with efficient protocols. In Security in Communication Networks, Lecture Notes in Computer Science, vol. 2576, Springer, Berlin, 268-289.
-
(2003)
Security in Communication Networks
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
18
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Lecture Notes in Computer Science, Springer, Berlin
-
CAMENISCH, J. AND LYSYANSKAYA, A. 2004. Signature schemes and anonymous credentials from bilinear maps. In Advances in Cryptology (CRYPTO'04), Lecture Notes in Computer Science, vol. 3152, Springer, Berlin, 56-72.
-
(2004)
Advances in Cryptology (CRYPTO'04)
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
19
-
-
84957610863
-
Proving in zero-knowledge that a number n is the product of two safe primes
-
Lecture Notes in Computer Science, Springer, Berlin
-
CAMENISCH, J. AND MICHELS, M. 1999a. Proving in zero-knowledge that a number n is the product of two safe primes. In Advances in Cryptology (EUROCRYPT'99), Lecture Notes in Computer Science, vol. 1592, Springer, Berlin, 107-122.
-
(1999)
Advances in Cryptology (EUROCRYPT'99)
, vol.1592
, pp. 107-122
-
-
Camenisch, J.1
Michels, M.2
-
20
-
-
84921060028
-
Seperability and efficiency for generic group signature schemes
-
Lecture Notes in Computer Science, Springer, Berlin
-
CAMENISCH, J. AND MICHELS, M. 1999b. Seperability and efficiency for generic group signature schemes. In Advances in Cryptology (CRYPTO'99), Lecture Notes in Computer Science, vol. 1666, Springer, Berlin, 413-430.
-
(1999)
Advances in Cryptology (CRYPTO'99)
, vol.1666
, pp. 413-430
-
-
Camenisch, J.1
Michels, M.2
-
21
-
-
38049132285
-
Simulatable adaptive oblivious transfer
-
Lecture Notes in Computer Science, Springer, Berlin
-
CAMENISCH, J., NEVEN, G., AND SHELAT, A. 2007. Simulatable adaptive oblivious transfer. In Advances in Cryptology (EUROCRYPT'07), Lecture Notes in Computer Science, vol. 4515, Springer, Berlin, 573-590.
-
(2007)
Advances in Cryptology (EUROCRYPT'07)
, vol.4515
, pp. 573-590
-
-
Camenisch, J.1
Neven, G.2
Shelat, A.3
-
23
-
-
84957661460
-
Easy come-easy go divisible cash
-
Lecture Notes in Computer Science, Springer, Berlin
-
CHAN, A., FRANKEL, Y., AND TSIOUNIS, Y. 1998. Easy come-easy go divisible cash. In Advances in Cryptology (EUROCRYPT'98), Lecture Notes in Computer Science, vol. 1403, Springer, Berlin, 561-575.
-
(1998)
Advances in Cryptology (EUROCRYPT'98)
, vol.1403
, pp. 561-575
-
-
Chan, A.1
Frankel, Y.2
Tsiounis, Y.3
-
24
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
DOI 10.1145/4372.4373
-
CHAUM, D. 1985. Security without identification: Transaction systems to make big brother obsolete. Comm. ACM 28,10, 1030-1044. (Pubitemid 15587967)
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum David1
-
25
-
-
85001025766
-
Wallet databases with observers
-
Lecture Notes in Computer Science, Springer, Berlin
-
CHAUM, D. AND PEDERSEN, T. P. 1992.Wallet databases with observers. In Advances in Cryptology (CRYPTO'92), Lecture Notes in Computer Science, vol. 740, Springer, Berlin, 89-105.
-
(1992)
Advances in Cryptology (CRYPTO'92)
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
26
-
-
0032201622
-
Private information retrieval
-
CHOR, B., KUSHILEVITZ, E., GOLDREICH, O., AND SUDAN, M. 1998. Private information retrieval. J. ACM 45, 6, 965-981.
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
27
-
-
0001865043
-
A Comparison of commercial and military computer security policies
-
IEEE, Washington, D.C
-
CLARK, D. D. AND WILSON, D. R. 1987. A Comparison of commercial and military computer security policies. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, Washington, D.C., 27-29.
-
(1987)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 27-29
-
-
Clark, D.D.1
Wilson, D.R.2
-
28
-
-
84957802212
-
Efficient zero-knowledge proofs of knowledge without intractability assumptions
-
Lecture Notes in Computer Science
-
CRAMER, R., DAMGARD, I., AND MACKENZIE, P. 2000. Efficient zero-knowledge proofs of knowledge without intractability assumptions. In Public Key Cryptography, Lecture Notes in Computer Science, vol. 1751, 354-372.
-
(2000)
Public Key Cryptography
, vol.1751
, pp. 354-372
-
-
Cramer, R.1
Damgard, I.2
Mackenzie, P.3
-
29
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Lecture Notes in Computer Science, Springer, Berlin
-
CRAMER, R., DAMGARD, I., AND SCHOENMAKERS, B. 1994. Proofs of partial knowledge and simplified design of witness hiding protocols. In Advances in Cryptology (CRYPTO'94), Lecture Notes in Computer Science, vol. 839, Springer, Berlin, 174-187.
-
(1994)
Advances in Cryptology (CRYPTO'94)
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgard, I.2
Schoenmakers, B.3
-
30
-
-
84957690041
-
Conditional oblivious transfer and time released encryption
-
Lecture Notes in Computer Science, Springer, Berlin
-
CRESCENZO, G. D., OSTROVSKY, R., AND RAJAGOPOLAN, S. 1999. Conditional oblivious transfer and time released encryption. In Advances in Cryptology (EUROCRYPT'99), Lecture Notes in Computer Science, vol. 1592, Springer, Berlin, 74-89.
-
(1999)
Advances in Cryptology (EUROCRYPT'99)
, vol.1592
, pp. 74-89
-
-
Crescenzo, G.D.1
Ostrovsky, R.2
Rajagopolan, S.3
-
31
-
-
84958774556
-
An integer commitment scheme based on groups with hidden order
-
Lecture Notes in Computer Science, Springer, Berlin
-
DAMGARD, I. AND FUJISAKI, E. 2002. An integer commitment scheme based on groups with hidden order. In Advances in Cryptology (ASIACRYPT'02), Lecture Notes in Computer Science, vol. 2501, Springer, Berlin, 125-142.
-
(2002)
Advances in Cryptology (ASIACRYPT'02)
, vol.2501
, pp. 125-142
-
-
Damgard, I.1
Fujisaki, E.2
-
33
-
-
24144481228
-
A verifiable random function with short proofs and keys
-
Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
-
DODIS, Y. AND YAMPOLSKIY, A. 2005. A verifiable random function with short proofs and keys. In Public Key Cryptology (PKC'05), Lecture Notes in Computer Science, vol. 3386. Springer, Berlin, 416-431. (Pubitemid 41231346)
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 416-431
-
-
Dodis, Y.1
Yampolskiy, A.2
-
34
-
-
67049158194
-
Security of blind signatures under aborts
-
Lecture Notes in Computer Science, Springer, Berlin
-
FISCHLIN, M. AND SCHRODER, D. 2009. Security of blind signatures under aborts. In Public Key Cryptography (PKC'09), Lecture Notes in Computer Science, vol. 5443, Springer, Berlin, 297-316.
-
(2009)
Public Key Cryptography (PKC'09)
, vol.5443
, pp. 297-316
-
-
Fischlin, M.1
Schroder, D.2
-
35
-
-
84958615646
-
Statistical zero knowledge protocols to prove modular polynomial relations
-
Advances in Cryptology - CRYPTO '97
-
FUJISAKI, E. AND OKAMOTO, T. 1997. Statistical zero knowledge protocols to prove modular polynomial relations. In Advances in Cryptology (CRYPTO'97), Lecture Notes in Computer Science, vol. 1294, Springer, Berlin, 16-30. (Pubitemid 127112542)
-
(1997)
Lecture Notes in Computer Science
, Issue.1294
, pp. 16-30
-
-
Fujisaki, E.1
Okamoto, T.2
-
36
-
-
0022793132
-
How to construct
-
random functions
-
GOLDREICH, O.,GOLDWASSER, S., ANDMICALI, S. 1986. How to construct random functions. J. ACM33, 4, 792-807.
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Andmicali, S.3
-
37
-
-
0022914590
-
Proofs that yield nothing but their validity and a methodology of cryptographic protocol design
-
GOLDREICH, O.,MICALI, S., AND WIGDERSON, A. 1986. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design. In Proceeding of the 27th Annual Symposium on Foundations of Computer Science (FOCS'86), IEEE, Los Alamitos, CA, 174-187. (Pubitemid 17535962)
-
(1986)
Annual Symposium on Foundations of Computer Science (Proceedings)
, pp. 174-187
-
-
Goldreich Oded1
Micali Silvio2
Wigderson Avi3
-
38
-
-
0023985465
-
A digital signature scheme secure against adaptive chosenmessage attacks
-
GOLDWASSER, S.,MICALI, S., AND RIVEST, R. L. 1988. A digital signature scheme secure against adaptive chosenmessage attacks. SIAM J. Comput. 17, 2, 281-308.
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
39
-
-
79959845165
-
-
GOOGLE. Google Health
-
GOOGLE. 2009. Google Health. https://www.google.com/health.
-
(2009)
-
-
-
40
-
-
38149091799
-
Blind identity-based encryption and simulatable oblivious transfer
-
Lecture Notes in Computer Science, Springer, Berlin
-
GREEN, M. AND HOHENBERGER, S. 2007. Blind identity-based encryption and simulatable oblivious transfer. In Advances in Cryptology (ASIACRYPT'07), Lecture Notes in Computer Science, vol. 4833, Springer, Berlin, 265-282.
-
(2007)
Advances in Cryptology (ASIACRYPT'07)
, vol.4833
, pp. 265-282
-
-
Green, M.1
Hohenberger, S.2
-
41
-
-
70350656283
-
Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection
-
Lecture Notes in Computer Science, Springer, Berlin
-
JARECKI, S. AND LIU, X. 2009. Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection. In Theory of Cryptography, Lecture Notes in Computer Science, vol. 5444, Springer, Berlin, 577-594.
-
(2009)
Theory of Cryptography
, vol.5444
, pp. 577-594
-
-
Jarecki, S.1
Liu, X.2
-
44
-
-
79959836490
-
-
MICROSOFT. Microsoft HealthVault
-
MICROSOFT. 2009. Microsoft HealthVault. http://www.healthvault.com/.
-
(2009)
-
-
-
45
-
-
84957096920
-
Oblivious transfer with adaptive queries
-
Lecture Notes in Computer Science, Springer, Berlin
-
NAOR, M. AND PINKAS, B. 1999. Oblivious transfer with adaptive queries. In Advances in Cryptology (CRYPTO'99), Lecture Notes in Computer Science, vol. 1666, Springer, Berlin, 573-590.
-
(1999)
Advances in Cryptology (CRYPTO'99)
, vol.1666
, pp. 573-590
-
-
Naor, M.1
Pinkas, B.2
-
46
-
-
0031332843
-
Number-theoretic constructions of efficient pseudo-random functions
-
IEEE, Los Alamitos, CA
-
NAOR, M. AND REINGOLD, O. 1997. Number-theoretic constructions of efficient pseudo-random functions. In Proceedings of the Annual IEEE Symposium on Foundations of Computer Science (FOCS'97). IEEE, Los Alamitos, CA, 458-467.
-
(1997)
Proceedings of the Annual IEEE Symposium on Foundations of Computer Science (FOCS'97)
, pp. 458-467
-
-
Naor, M.1
Reingold, O.2
-
47
-
-
1942420748
-
Oblivious keyword search. Special issue on coding and cryptography
-
OGATA, W. AND KUROSAWA, K. 2004. Oblivious keyword search. Special issue on coding and cryptography. J. Complexity 20, 2-3, 356-371.
-
(2004)
J. Complexity
, vol.20
, Issue.2-3
, pp. 356-371
-
-
Ogata, W.1
Kurosawa, K.2
-
48
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Lecture Notes in Computer Science, Springer, Berlin
-
PEDERSEN, T. P. 1992. Non-interactive and information-theoretic secure verifiable secret sharing. In Advances in Cryptology (CRYPTO'92). Lecture Notes in Computer Science, vol. 576, Springer, Berlin, 129-140.
-
(1992)
Advances in Cryptology (CRYPTO'92)
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
49
-
-
0000089246
-
Efficient signature generation for smart cards
-
SCHNORR, C.-P. 1991. Efficient signature generation for smart cards. J. Cryptology 4, 3, 239-252.
-
(1991)
J. Cryptology
, vol.4
, Issue.3
, pp. 239-252
-
-
Schnorr, C.-P.1
-
50
-
-
35048839792
-
K-times anonymous authentication
-
Lecture Notes in Computer Science, Springer, Berlin
-
TERANISHI, I., FURUKAWA, J., AND SAKO, K. 2004. k-times anonymous authentication. In Advances in Cryptology (ASIACRYPT'04), Lecture Notes in Computer Science, vol. 3329, Springer, Berlin, 308-322.
-
(2004)
Advances in Cryptology (ASIACRYPT'04)
, vol.3329
, pp. 308-322
-
-
Teranishi, I.1
Furukawa, J.2
Sako, K.3
-
51
-
-
24944566040
-
Efficient Identity-Based Encryption without random oracles
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
WATERS, B. 2005. Efficient identity-based encryption without random oracles. In Advances in Cryptology (EUROCRYPT'05), Lecture Notes in Computer Science, vol. 3494, Springer, Berlin, 114-127. (Pubitemid 41313949)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 114-127
-
-
Waters, B.1
|