메뉴 건너뛰기




Volumn , Issue , 2007, Pages 63-76

Highly efficient secrecy-preserving proofs of correctness of computations and applications

Author keywords

[No Author keywords available]

Indexed keywords

INPUT VALUES; SECURE PROCESSORS;

EID: 82755188831     PISSN: 10436871     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LICS.2007.24     Document Type: Conference Paper
Times cited : (17)

References (11)
  • 3
    • 14844283355 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • Full length version of extended abstract available at
    • J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. Full length version of extended abstract in Proc. Crypto 2003, available at http://eprint.iacr.org/2002/161.pdf, 2003.
    • (2003) Proc. Crypto 2003
    • Camenisch, J.1    Shoup, V.2
  • 5
    • 84990731886 scopus 로고
    • How to prove youself: Practical solutions to identification and signature problems
    • A. Fiat and A. Shamir. How to prove youself: practical solutions to identification and signature problems. In Proceedings of CRYPTO'86, pages 186-194, 1987.
    • (1987) Proceedings of CRYPTO'86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 7
    • 8644270771 scopus 로고    scopus 로고
    • Covert channel analysis
    • Chapter 8 of NRL Technical Memorandum, available at
    • J. McHugh. Covert channel analysis. Chapter 8 of Handbook for the Computer Security Certification of Trusted Systems, NRL Technical Memorandum, available at http://chacs.nrl.navy.mil/publications/handbook/COVCHAN.pdf, 1996.
    • (1996) Handbook for the Computer Security Certification of Trusted Systems
    • McHugh, J.1
  • 8
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • J. Stern, editor of Lecture Notes in Computer Science SpringerVerlag
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In J. Stern, editor, Advances in Cryptology - (EUROCRYPT 1999), volume 1592 of Lecture Notes in Computer Science, pages 107-122. SpringerVerlag, 1999.
    • (1999) Advances in Cryptology - (EUROCRYPT 1999) , vol.1592 , pp. 107-122
    • Paillier, P.1
  • 9
    • 70450210406 scopus 로고    scopus 로고
    • Practical secrecy-preserving, verifiably correct and trustworthy auctions
    • DOI 10.1145/1151454.1151478, Proc. of the 8th Int. Conf. on Electronic Commerce 2006 - The New E-Commerce: Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet
    • D. C. Parkes, M. O. Rabin, S. M. Shieber, and C. A. Thorpe. Practical secrecy-preserving, verifiably correct and trustworthy auctions. In Proceedings of the 8th International Conference on Electronic Commerce (ICEC), pages 70-81, 2006. (Pubitemid 47140648)
    • (2006) Proceedings of the ACM Conference on Electronic Commerce , pp. 70-81
    • Parkes, D.C.1    Rabin, M.O.2    Shieber, S.M.3    Thorpe, C.A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.