-
1
-
-
70350399649
-
Secure Evaluation of Private Linear Branching Programs with Medical Applications
-
Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
-
Barni, M., Failla, P., Kolesnikov, V., Lazzeretti, R., Sadeghi, A.-R., Schneider, T.: Secure Evaluation of Private Linear Branching Programs with Medical Applications. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 424-439. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5789
, pp. 424-439
-
-
Barni, M.1
Failla, P.2
Kolesnikov, V.3
Lazzeretti, R.4
Sadeghi, A.-R.5
Schneider, T.6
-
2
-
-
85014508412
-
Multiparty Computation with Faulty Majority
-
Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
-
Beaver, D., Goldwasser, S.: Multiparty Computation with Faulty Majority. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 589-590. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 589-590
-
-
Beaver, D.1
Goldwasser, S.2
-
3
-
-
84873965610
-
Distributed private data analysis: On simultaneously solving how and what
-
abs/1103.2626
-
Beimel, A., Nissim, K., Omri, E.: Distributed private data analysis: On simultaneously solving how and what. CoRR, abs/1103.2626 (2011)
-
(2011)
CoRR
-
-
Beimel, A.1
Nissim, K.2
Omri, E.3
-
4
-
-
85024585723
-
Incremental Cryptography: The Case of Hashing and Signing
-
Desmedt, Y.G. (ed.) CRYPTO 1994. Springer, Heidelberg
-
Bellare, M., Goldreich, O., Goldwasser, S.: Incremental Cryptography: The Case of Hashing and Signing. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 216-233. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.839
, pp. 216-233
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
5
-
-
57049188348
-
Sharemind: A Framework for Fast Privacy-Preserving Computations
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
-
Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A Framework for Fast Privacy-Preserving Computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192-206. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 192-206
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
6
-
-
84873942693
-
Deploying secure multiparty computation for financial data analysis
-
Technical report, ePrint, 2011/662
-
Bogdanov, D., Talviste, R., Willemson, J.: Deploying secure multiparty computation for financial data analysis. Technical report, Cryptology ePrint, 2011/662
-
Cryptology
-
-
Bogdanov, D.1
Talviste, R.2
Willemson, J.3
-
7
-
-
70350379222
-
Secure Multiparty Computation Goes Live
-
Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg
-
Bogetoft, P., Christensen, D.L., Damgård, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Secure Multiparty Computation Goes Live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 325-343. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5628
, pp. 325-343
-
-
Bogetoft, P.1
Christensen, D.L.2
Damgård, I.3
Geisler, M.4
Jakobsen, T.5
Krøigaard, M.6
Nielsen, J.D.7
Nielsen, J.B.8
Nielsen, K.9
Pagter, J.10
Schwartzbach, M.11
Toft, T.12
-
8
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
ACM
-
Chaum, D., Crépeau, C., Damgard, I.: Multiparty unconditionally secure protocols. In: ACM Symposium on Theory of Computing, pp. 11-19. ACM (1988)
-
(1988)
ACM Symposium on Theory of Computing
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgard, I.3
-
9
-
-
84947955350
-
Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer
-
Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
-
Chaum, D., van Heijst, E., Pfitzmann, B.: Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 470-484. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 470-484
-
-
Chaum, D.1
Van Heijst, E.2
Pfitzmann, B.3
-
10
-
-
85016672373
-
Proof of Partial Knowledge and Simplified Design of Witness Hiding Protocols
-
Desmedt, Y.G. (ed.) CRYPTO 1994. Springer, Heidelberg
-
Cramer, R., Damgård, I., Schoenmakers, B.: Proof of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174-187. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
11
-
-
84873963176
-
Rate-Limited Secure Function Evaluation: Definitions and Constructions
-
ePrint, Report 201X/XXX
-
Dagdelen, Ö., Mohassel, P., Venturi, D.: Rate-Limited Secure Function Evaluation: Definitions and Constructions. Cryptology ePrint, Report 201X/XXX
-
Cryptology
-
-
Dagdelen, Ö.1
Mohassel, P.2
Venturi, D.3
-
12
-
-
67049134126
-
Asynchronous Multiparty Computation: Theory and Implementation
-
Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
-
Damgård, I., Geisler, M., Krøigaard, M., Nielsen, J.B.: Asynchronous Multiparty Computation: Theory and Implementation. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 160-179. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 160-179
-
-
Damgård, I.1
Geisler, M.2
Krøigaard, M.3
Nielsen, J.B.4
-
13
-
-
24144488603
-
Keyword search and oblivious pseudorandom functions
-
Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
-
Freedman, M.J., Ishai, Y., Pinkas, B., Reingold, O.: Keyword Search and Oblivious Pseudorandom Functions. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 303-324. Springer, Heidelberg (2005) (Pubitemid 41231171)
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 303-324
-
-
Freedman, M.J.1
Ishai, Y.2
Pinkas, B.3
Reingold, O.4
-
14
-
-
84873972913
-
Automata evaluation and text search protocols with simulation based security
-
ePrint, Report 2010/484
-
Gennaro, R., Hazay, C., Sorensen, F.: Automata evaluation and text search protocols with simulation based security. Cryptology ePrint, Report 2010/484
-
Cryptology
-
-
Gennaro, R.1
Hazay, C.2
Sorensen, F.3
-
15
-
-
0023545076
-
How to play any mental game
-
ACM
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: ACM Symposium on Theory of Computing, pp. 218-229. ACM (1987)
-
(1987)
ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
16
-
-
84924354505
-
Efficient oblivious polynomial evaluation with simulation-based security
-
Technical report, ePrint, Report 2009/459
-
Hazay, C., Lindell, Y.: Efficient oblivious polynomial evaluation with simulation-based security. Technical report, Cryptology ePrint, Report 2009/459
-
Cryptology
-
-
Hazay, C.1
Lindell, Y.2
-
17
-
-
40249108370
-
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
-
Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
-
Hazay, C., Lindell, Y.: Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
18
-
-
79955547393
-
Efficient Set Operations in the Presence of Malicious Adversaries
-
Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
-
Hazay, C., Nissim, K.: Efficient Set Operations in the Presence of Malicious Adversaries. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 312-331. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6056
, pp. 312-331
-
-
Hazay, C.1
Nissim, K.2
-
19
-
-
78650837624
-
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries
-
Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
-
Hazay, C., Toft, T.: Computationally Secure Pattern Matching in the Presence of Malicious Adversaries. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 195-212. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6477
, pp. 195-212
-
-
Hazay, C.1
Toft, T.2
-
20
-
-
78649992236
-
TASTY: Tool for automating secure two-party computations
-
Henecka, W., Kogl, S., Sadeghi, A.-R., Schneider, T., Wehrenberg, I.: TASTY: tool for automating secure two-party computations. In: ACM CCS 2007 (2010)
-
(2010)
ACM CCS 2007
-
-
Henecka, W.1
Kogl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
21
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. In: USENIX Security (2011)
-
(2011)
USENIX Security
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
22
-
-
38049046515
-
Evaluating Branching Programs on Encrypted Data
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Ishai, Y., Paskin, A.: Evaluating Branching Programs on Encrypted Data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 575-594. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 575-594
-
-
Ishai, Y.1
Paskin, A.2
-
23
-
-
38049136533
-
Efficient Two-Party Secure Computation on Committed Inputs
-
Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
-
Jarecki, S., Shmatikov, V.: Efficient Two-Party Secure Computation on Committed Inputs. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 97-114. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 97-114
-
-
Jarecki, S.1
Shmatikov, V.2
-
24
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay - a secure two-party computation system. In: USENIX Security (2004)
-
(2004)
USENIX Security
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
25
-
-
84865295525
-
Knowledge-oriented secure multiparty computation
-
June
-
Mardziel, P., Hicks, M., Katz, J., Srivatsa, M.: Knowledge-oriented secure multiparty computation. In: ACM SIGPLAN - PLAS (June 2012)
-
(2012)
ACM SIGPLAN - PLAS
-
-
Mardziel, P.1
Hicks, M.2
Katz, J.3
Srivatsa, M.4
-
26
-
-
84873964793
-
The limits of two-party differential privacy
-
McGregor, A., Mironov, I., Pitassi, T., Reingold, O., Talwar, K., Vadhan, S.: The limits of two-party differential privacy. ECCC 18:106 (2011)
-
(2011)
ECCC
, vol.18
, pp. 106
-
-
McGregor, A.1
Mironov, I.2
Pitassi, T.3
Reingold, O.4
Talwar, K.5
Vadhan, S.6
-
27
-
-
84862483119
-
Oblivious keyword search
-
Technical report, ePrint, Report 2002/182
-
Ogata, W., Kurosawa, K.: Oblivious keyword search. Technical report, Cryptology ePrint, Report 2002/182
-
Cryptology
-
-
Ogata, W.1
Kurosawa, K.2
-
28
-
-
57049083569
-
Privacy preserving error resilient DNA searching through oblivious automata
-
Troncoso-Pastoriza, J., Katzenbeisser, S., Celik, M.: Privacy preserving error resilient DNA searching through oblivious automata. In: ACM CCS, pp. 519-528 (2007)
-
(2007)
ACM CCS
, pp. 519-528
-
-
Troncoso-Pastoriza, J.1
Katzenbeisser, S.2
Celik, M.3
-
29
-
-
0020312165
-
Protocols for secure computations
-
extended abstract
-
Yao, A.C.: Protocols for secure computations (extended abstract). In: FOCS, pp. 160-164 (1982)
-
(1982)
FOCS
, pp. 160-164
-
-
Yao, A.C.1
-
30
-
-
0022882770
-
How to generate and exchange secrets
-
extended abstract
-
Yao, A.C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162-167 (1986)
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.C.1
|