-
1
-
-
78149266544
-
Privacy-preserving fingercode authentication
-
Roma, Italy ACM
-
M. Barni, T. Bianchi, D. Catalano, M. D. Raimondo, R. D. Labati, and P. Faillia. Privacy-preserving fingercode authentication. In MM&Sec', Roma, Italy, 2010. ACM.
-
(2010)
MM&Sec
-
-
Barni, M.1
Bianchi, T.2
Catalano, D.3
Raimondo, M.D.4
Labati, R.D.5
Faillia, P.6
-
3
-
-
57049188348
-
Sharemind: A framework for fast privacy-preserving computations
-
D. Bogdanov, S. Laur, and J. Willemson. Sharemind: A framework for fast privacy-preserving computations. In ESORICS, pages 192-206, 2008.
-
(2008)
ESORICS
, pp. 192-206
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
4
-
-
67049134126
-
Asynchronous multiparty computation: Theory and implementation
-
I. Damgård, M. Geisler, M. Krøigaard, and J. B. Nielsen. Asynchronous multiparty computation: Theory and implementation. In Public Key Cryptography, pages 160-179, 2009.
-
(2009)
Public Key Cryptography
, pp. 160-179
-
-
Damgård, I.1
Geisler, M.2
Krøigaard, M.3
Nielsen, J.B.4
-
5
-
-
84867553981
-
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
-
Public Key Cryptography
-
I. Damgård and M. Jurik. A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In Public Key Cryptography, pages 119-136, 2001. (Pubitemid 33232937)
-
(2001)
Lecture Notes in Computer Science
, Issue.1992
, pp. 119-136
-
-
Damgard, I.1
Jurik, M.2
-
6
-
-
77956992852
-
Multiparty computation for dishonest majority: From passive to active security at low cost
-
I. Damgård and C. Orlandi. Multiparty computation for dishonest majority: From passive to active security at low cost. In CRYPTO, pages 558-576, 2010.
-
(2010)
CRYPTO
, pp. 558-576
-
-
Damgård, I.1
Orlandi, C.2
-
7
-
-
69949163699
-
Privacy-preserving face recognition
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft. Privacy-preserving face recognition. In Privacy Enhancing Technologies, pages 235-253, 2009.
-
(2009)
Privacy Enhancing Technologies
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
10
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC, pages 169-178, 2009.
-
(2009)
STOC
, pp. 169-178
-
-
Gentry, C.1
-
11
-
-
78649992236
-
Tasty: Tool for automating secure two-party computations
-
W. Henecka, S. Kögl, A.-R. Sadeghi, T. Schneider, and I. Wehrenberg. Tasty: Tool for automating secure two-party computations. In ACM Conference on Computer and Communications Security, 2010.
-
(2010)
ACM Conference on Computer and Communications Security
-
-
Henecka, W.1
Kögl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
12
-
-
24144457853
-
Extending oblivious transfers efficiently
-
Y. Ishai, J. Kilian, K. Nissim, and E. Petrank. Extending oblivious transfers efficiently. In CRYPTO, pages 145-161, 2003. (Pubitemid 137636940)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
14
-
-
71549170830
-
Improved garbled circuit building blocks and applications to auctions and computing minima
-
V. Kolesnikov, A.-R. Sadeghi, and T. Schneider. Improved garbled circuit building blocks and applications to auctions and computing minima. In CANS, pages 1-20, 2009.
-
(2009)
CANS
, pp. 1-20
-
-
Kolesnikov, V.1
Sadeghi, A.-R.2
Schneider, T.3
-
15
-
-
49049099825
-
Improved garbled circuit: Free XOR gates and applications
-
Berlin, Heidelberg Springer-Verlag
-
V. Kolesnikov and T. Schneider. Improved garbled circuit: Free XOR gates and applications. In ICALP '08: Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II, pages 486-498, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
ICALP '08: Proceedings of the 35th International Colloquium on Automata, Languages and Programming, Part II
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
16
-
-
64249101946
-
A proof of security of yao's protocol for two-party computation
-
Y. Lindell and B. Pinkas. A proof of security of yao's protocol for two-party computation. J. Cryptology, 22(2):161-188, 2009.
-
(2009)
J. Cryptology
, vol.22
, Issue.2
, pp. 161-188
-
-
Lindell, Y.1
Pinkas, B.2
-
17
-
-
52149120767
-
Implementing two-party computation efficiently with security against malicious adversaries
-
Y. Lindell, B. Pinkas, and N. P. Smart. Implementing two-party computation efficiently with security against malicious adversaries. In SCN, pages 2-20, 2008.
-
(2008)
SCN
, pp. 2-20
-
-
Lindell, Y.1
Pinkas, B.2
Smart, N.P.3
-
20
-
-
80054814127
-
VMCrypt - Modular software architecture for scalable secure computation
-
L. Malka. VMCrypt - modular software architecture for scalable secure computation. EPrint report 2010/584, 2010.
-
(2010)
EPrint Report 2010/584
-
-
Malka, L.1
-
21
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
Berkeley, CA, USA USENIX Association
-
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Fairplay - a secure two-party computation system. In SSYM04: Proceedings of the 13th conference on USENIX Security Symposium, pages 20-20, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
SSYM04: Proceedings of the 13th Conference on USENIX Security Symposium
, pp. 20-20
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
22
-
-
64049119146
-
Efficient oblivious transfer protocols
-
M. Naor and B. Pinkas. Efficient oblivious transfer protocols. In SODA, pages 448-457, 2001.
-
(2001)
SODA
, pp. 448-457
-
-
Naor, M.1
Pinkas, B.2
-
24
-
-
77955178939
-
Scifi - A system for secure face identification
-
M. Osadchy, B. Pinkas, A. Jarrous, and B. Moskovich. Scifi - a system for secure face identification. In IEEE Symposium on Security and Privacy, pages 239-254, 2010.
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 239-254
-
-
Osadchy, M.1
Pinkas, B.2
Jarrous, A.3
Moskovich, B.4
-
26
-
-
68849099052
-
Practical secure evaluation of semi-private functions
-
A. Paus, A.-R. Sadeghi, and T. Schneider. Practical secure evaluation of semi-private functions. In ACNS, pages 89-106, 2009.
-
(2009)
ACNS
, pp. 89-106
-
-
Paus, A.1
Sadeghi, A.-R.2
Schneider, T.3
-
27
-
-
72449131818
-
Secure two-party computation is practical
-
B. Pinkas, T. Schneider, N. P. Smart, and S. C. Williams. Secure two-party computation is practical. In ASIACRYPT, pages 250-267, 2009.
-
(2009)
ASIACRYPT
, pp. 250-267
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.P.3
Williams, S.C.4
-
28
-
-
77954610725
-
Efficient privacy-preserving face recognition
-
A.-R. Sadeghi, T. Schneider, and I. Wehrenberg. Efficient privacy-preserving face recognition. In ICISC, pages 229-244, 2009.
-
(2009)
ICISC
, pp. 229-244
-
-
Sadeghi, A.-R.1
Schneider, T.2
Wehrenberg, I.3
-
29
-
-
79955532534
-
Fully homomorphic encryption with relatively small key and ciphertext sizes
-
N. P. Smart and F. Vercauteren. Fully homomorphic encryption with relatively small key and ciphertext sizes. In Public Key Cryptography, pages 420-443, 2010.
-
(2010)
Public Key Cryptography
, pp. 420-443
-
-
Smart, N.P.1
Vercauteren, F.2
-
30
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
M. van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan. Fully homomorphic encryption over the integers. In EUROCRYPT, pages 24-43, 2010.
-
(2010)
EUROCRYPT
, pp. 24-43
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
31
-
-
0022882770
-
How to generate and exchange secrets (extended abstract)
-
A. C.-C. Yao. How to generate and exchange secrets (extended abstract). In FOCS, pages 162-167, 1986.
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.C.-C.1
|