-
1
-
-
84937431456
-
Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
-
Springer-Verlag
-
J. Algesheimer, J. Camenisch, and V. Shoup. Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. In CRYPTO, pages 417-432. Springer-Verlag, 2002.
-
(2002)
CRYPTO
, pp. 417-432
-
-
Algesheimer, J.1
Camenisch, J.2
Shoup, V.3
-
3
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
Springer-Verlag
-
R. Cramer, I. Damgård, and J. B. Nielsen. Multiparty computation from threshold homomorphic encryption. In EUROCRYPT, pages 280-299. Springer-Verlag, 2001.
-
(2001)
EUROCRYPT
, pp. 280-299
-
-
Cramer, R.1
Damgård, I.2
Nielsen, J.B.3
-
4
-
-
33745567199
-
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
-
Springer
-
I. Damgård, M. Fitzi, E. Kiltz, J. B. Nielsen, and T. Toft. Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In Theory of Cryptography Conference (TCC), volume 3876, pages 285-304. Springer, 2006.
-
(2006)
Theory of Cryptography Conference (TCC)
, vol.3876
, pp. 285-304
-
-
Damgård, I.1
Fitzi, M.2
Kiltz, E.3
Nielsen, J.B.4
Toft, T.5
-
7
-
-
77955339189
-
Modulo reduction for paillier encryptions and application to secure statistical analysis
-
Springer
-
J. Guajardo, B. Mennink, and B. Schoenmakers. Modulo reduction for paillier encryptions and application to secure statistical analysis. In Financial Cryptography and Data Security, volume 6052, pages 375-382. Springer, 2010.
-
(2010)
Financial Cryptography and Data Security
, vol.6052
, pp. 375-382
-
-
Guajardo, J.1
Mennink, B.2
Schoenmakers, B.3
-
8
-
-
78649277234
-
Practical and secure integer comparison and interval check
-
IEEE Computer Society
-
A. E. Nergiz, M. E. Nergiz, T. Pedersen, and C. Clifton. Practical and secure integer comparison and interval check. In Proceedings of Second International Conference on Social Computing, pages 791-799. IEEE Computer Society, 2010.
-
(2010)
Proceedings of Second International Conference on Social Computing
, pp. 791-799
-
-
Nergiz, A.E.1
Nergiz, M.E.2
Pedersen, T.3
Clifton, C.4
-
9
-
-
82955177068
-
Constant-rounds, linear multi-party computation for exponentiation and modulo reduction with perfect security
-
ASIACRYPT, Springer
-
C. Ning and Q. Xu. Constant-rounds, linear multi-party computation for exponentiation and modulo reduction with perfect security. In ASIACRYPT, volume 7073 of LNCS, pages 572-589. Springer, 2011.
-
(2011)
LNCS
, vol.7073
, pp. 572-589
-
-
Ning, C.1
Xu, Q.2
-
11
-
-
38049034355
-
Multiparty computation for interval, equality, and comparison without bit-decomposition protocol
-
Springer-Verlag
-
T. Nishide and K. Ohta. Multiparty computation for interval, equality, and comparison without bit-decomposition protocol. In PKC, pages 343-360. Springer-Verlag, 2007.
-
(2007)
PKC
, pp. 343-360
-
-
Nishide, T.1
Ohta, K.2
-
12
-
-
84942550998
-
Public key cryptosystems based on composite degree residuosity classes
-
Springer-Verlag
-
P. Paillier. Public key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology - Eurocrypt '99, pages 223-238. Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology - Eurocrypt '99
, pp. 223-238
-
-
Paillier, P.1
-
13
-
-
77954596238
-
Linear, constant-rounds bit-decomposition
-
Springer-Verlag
-
T. Reistad and T. Toft. Linear, constant-rounds bit-decomposition. In ICISC, pages 245-257. Springer-Verlag, 2010.
-
(2010)
ICISC
, pp. 245-257
-
-
Reistad, T.1
Toft, T.2
-
14
-
-
33746092442
-
Efficient binary conversion for paillier encrypted values
-
Springer-Verlag
-
B. Schoenmakers and P. Tuyls. Efficient binary conversion for paillier encrypted values. In EUROCRYPT, pages 522-537. Springer-Verlag, 2006.
-
(2006)
EUROCRYPT
, pp. 522-537
-
-
Schoenmakers, B.1
Tuyls, P.2
-
15
-
-
0018545449
-
How to share a secret
-
nov
-
A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, nov 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
17
-
-
0020312165
-
Protocols for secure computations
-
Washington, DC, USA, IEEE Computer Society
-
A. C. Yao. Protocols for secure computations. In Symposium on Foundations of Computer Science, pages 160-164, Washington, DC, USA, 1982. IEEE Computer Society.
-
(1982)
Symposium on Foundations of Computer Science
, pp. 160-164
-
-
Yao, A.C.1
-
18
-
-
0022882770
-
How to generate and exchange secrets
-
IEEE Computer Society
-
A. C. Yao. How to generate and exchange secrets. In Symposium on Foundations of Computer Science, pages 162-167. IEEE Computer Society, 1986.
-
(1986)
Symposium on Foundations of Computer Science
, pp. 162-167
-
-
Yao, A.C.1
|