-
1
-
-
84937409147
-
Remarks on mix-network based on permutation networks
-
In PKC '01
-
M Abe and F Hoshino. Remarks on mix-network based on permutation networks. In PKC '01, pp.317-324.
-
-
-
Abe, M.1
Hoshino, F.2
-
2
-
-
84958744427
-
1-out-of-n signatures from a variety of keys
-
In ASIACRYPT '02
-
M Abe, M Ohkubo, and K Suzuki. 1-out-of-n signatures from a variety of keys. In ASIACRYPT '02, pp.415-432.
-
-
-
Abe, M.1
Ohkubo, M.2
Suzuki, K.3
-
4
-
-
35048870073
-
Cryptographic protocols for secure second-price auctions
-
Available at
-
F Brandt. Cryptographic protocols for secure second-price auctions. 2001. Available at http://www. brauer.in.tum.de/ brandtf/papers/cia2001.pdf
-
(2001)
-
-
Brandt, F.1
-
5
-
-
33745174191
-
A formal treatment of onion routing
-
In CRYPTO '05, of Lecture Notes in Computer Science, Berlin, Springer-Verlag
-
J Camenisch and A Mityagin. A formal treatment of onion routing. In CRYPTO '05, Vol.3089 of Lecture Notes in Computer Science, pp.169-187, Berlin, 2005. Springer-Verlag.
-
(2005)
, vol.3089
, pp. 169-187
-
-
Camenisch, J.1
Mityagin, A.2
-
6
-
-
0001604533
-
Blind signatures for untraceable payments
-
In CRYPTO '82
-
D Chaum. Blind signatures for untraceable payments. In CRYPTO '82, pp.199-204.
-
-
-
Chaum, D.1
-
7
-
-
0022145479
-
Security without identification: transaction systems to make big brother obsolete
-
In Communications of the ACM
-
D Chaum. Security without identification: transaction systems to make big brother obsolete. In Communications of the ACM, 28 (1985), pp.1030-1044.
-
, vol.28
, Issue.1985
, pp. 1030-1044
-
-
Chaum, D.1
-
8
-
-
84882936099
-
Blinding for unanticipated signatures
-
In EUROCRYPT '87
-
D Chaum. Blinding for unanticipated signatures. In EUROCRYPT '87, pp.227-236.
-
-
-
Chaum, D.1
-
9
-
-
35048835189
-
Untraceable electronic cash
-
In Crypto '88
-
D Chaum, A Fiat and M Naor. Untraceable electronic cash. In Crypto '88, pp.319-327.
-
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
10
-
-
0000969676
-
Elections with unconditionally-secret ballots and disruption equivalent to breaking rsa
-
In Eurocrypt '88
-
D Chaum. Elections with unconditionally-secret ballots and disruption equivalent to breaking rsa. In Eurocrypt '88, pp.177-182.
-
-
-
Chaum, D.1
-
11
-
-
85001025766
-
Wallet databases with observers
-
In CRYPTO '92
-
D Chaum and T Pedersen. Wallet databases with observers. In CRYPTO '92, pp.89-105.
-
-
-
Chaum, D.1
Pedersen, T.2
-
12
-
-
84947288202
-
Efficient sealed-bid auctions for massive numbers of bidders with lump comparison
-
In Information Security, 4th International Conference, ISC
-
K Chida, K Kobayashi, and H Morita. Efficient sealed-bid auctions for massive numbers of bidders with lump comparison. In Information Security, 4th International Conference, ISC 2001, pp.408-419.
-
(2001)
, pp. 408-419
-
-
Chida, K.1
Kobayashi, K.2
Morita, H.3
-
14
-
-
84880857711
-
An efficient scheme for proving a shuffle
-
In CRYPTO '01
-
J Furukawa and K Sako. An efficient scheme for proving a shuffle. In CRYPTO '01, pp.368-387.
-
-
-
Furukawa, J.1
Sako, K.2
-
15
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
In Proceedings of the Nineteenth Annual ACM Symposi-um on Theory of Computing, STOC 1987
-
Oded Goldreich, Silvio Micali, and Avi Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In Proceedings of the Nineteenth Annual ACM Symposi-um on Theory of Computing, STOC 1987, pp.218-229, 1987.
-
(1987)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
16
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
D. M. Goldschlag, M. G. Reed, and P. F. Syverson. Onion routing for anonymous and private internet connections. Comm. of the ACM, 42(2), pp.84-88, 1999.
-
(1999)
Comm. of the ACM
, vol.42
, Issue.2
, pp. 84-88
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
17
-
-
35248822599
-
A verifiable secret shuffle of homomorphic encryptions
-
J Groth. A verifiable secret shuffle of homomorphic encryptions. In Public Key Cryptography 2003, pp.145-160.
-
(2003)
In Public Key Cryptography
, pp. 145-160
-
-
Groth, J.1
-
18
-
-
27544495621
-
Efficient and verifiable shuffling and shuffle-decryption
-
In IEICE Transactions
-
J Furukawa. Efficient and verifiable shuffling and shuffle-decryption. In IEICE Transactions 88-A(1), pp.172-188, 2005.
-
(2005)
, vol.88 A
, Issue.1
, pp. 172-188
-
-
Furukawa, J.1
-
19
-
-
31144445731
-
Technical challenges of network anonymity
-
1 February
-
D Kesdogana and C Palme. Technical challenges of network anonymity. In Computer Communica-tions, Vol.29, Issue 3, 1 February 2006, pp.306-324.
-
(2006)
In Computer Communica-tions
, vol.29
, Issue.3
, pp. 306-324
-
-
Kesdogana, D.1
Palme, C.2
-
20
-
-
0002400630
-
Multi-round anonymous auction
-
In IEEE Workshop on De-pendable and Real-Time E-Commerce Systems
-
H Kikuchi, M Harkavy, and J Tygar. Multi-round anonymous auction. In IEEE Workshop on De-pendable and Real-Time E-Commerce Systems 1998, pp.62-69.
-
(1998)
, pp. 62-69
-
-
Kikuchi, H.1
Harkavy, M.2
Tygar, J.3
-
21
-
-
0842339416
-
(m+1)st-price auction
-
In FC '01
-
H Kikuchi. (m+1)st-price auction. In FC '01, 291-298.
-
-
-
Kikuchi, H.1
-
22
-
-
84961626294
-
Distributed auction servers resolving winner and win-ning bid without revealing privacy of bids
-
In NGITA '00
-
H Kikuchi, S Hotta, K Abe, and S Nakanishi. Distributed auction servers resolving winner and win-ning bid without revealing privacy of bids. In NGITA '00, pp.307-312.
-
-
-
Kikuchi, H.1
Hotta, S.2
Abe, K.3
Nakanishi, S.4
-
23
-
-
0035754862
-
A verifiable secret shuffle and its application to e-voting
-
In ACM CCS '01
-
C Neff. A verifiable secret shuffle and its application to e-voting. In ACM CCS '01, pp.116-125, 2001.
-
(2001)
, pp. 116-125
-
-
Neff, C.1
-
24
-
-
79952047267
-
Verifiable mixing (shuffling) of elgamal pairs
-
Available as
-
C Neff. Verifiable mixing (shuffling) of elgamal pairs. 2004. Available as http://theory.lcs.mit.edu/ rivest/voting/papers/Neff-2004-04-21-ElGamalShuffles.pdf.
-
(2004)
-
-
Neff, C.1
-
25
-
-
84957024214
-
A second-price sealed-bid auction with the discriminant of the p-th root
-
In FC '02
-
K Omote and A Miyaji. A second-price sealed-bid auction with the discriminant of the p-th root. In FC '02, pp.57-71.
-
-
-
Omote, K.1
Miyaji, A.2
-
26
-
-
33745162938
-
Simple and efficient shuffling with provable correctness and ZK privacy
-
In CRYPTO '05
-
K Peng, C Boyd, and E Dawson. Simple and efficient shuffling with provable correctness and ZK privacy. In CRYPTO '05, pp.188-204.
-
-
-
Peng, K.1
Boyd, C.2
Dawson, E.3
-
27
-
-
84944045443
-
Robust, privacy protecting and publicly verifiable sealed-bid auction
-
In ICICS '02
-
K Peng, C Boyd, E Dawson, and K Viswanathan. Robust, privacy protecting and publicly verifiable sealed-bid auction. In ICICS '02, pp.147-159.
-
-
-
Peng, K.1
Boyd, C.2
Dawson, E.3
Viswanathan, K.4
-
28
-
-
35048899692
-
A correct, private and efficient mix network
-
In PKC '04
-
K Peng, C Boyd, E Dawson, and K Viswanathan. A correct, private and efficient mix network. In PKC '04, pp.439-454.
-
-
-
Peng, K.1
Boyd, C.2
Dawson, E.3
Viswanathan, K.4
-
29
-
-
78049405706
-
Efficiency improvement of homomorphic e-auction
-
In TRUSTBUS '10
-
K Peng and F Bao. Efficiency improvement of homomorphic e-auction. In TRUSTBUS '10, pp.238-249.
-
-
-
Peng, K.1
Bao, F.2
-
30
-
-
78751649436
-
Modification and optimisation of a shuffling scheme: stronger securi-ty, formal analysis and higher efficiency
-
In International Journal of Information Security
-
K Peng, E Dawson, and F Bao. Modification and optimisation of a shuffling scheme: stronger securi-ty, formal analysis and higher efficiency. In International Journal of Information Security, 2011 Vol.10, No.1, pp.33-47.
-
(2011)
, vol.10
, Issue.1
, pp. 33-47
-
-
Peng, K.1
Dawson, E.2
Bao, F.3
-
31
-
-
79958782196
-
Secure E-auction for mobile users with low-capability devices in wireless network
-
In WISTP '11
-
K Peng. Secure E-auction for mobile users with low-capability devices in wireless network. In WISTP '11, pp.351-360.
-
-
-
Peng, K.1
-
32
-
-
85025166570
-
A Secure Mix Network with an Efficient Validity Verification Mechanism
-
In IDCS '12
-
K Peng and Y Zhang. A Secure Mix Network with an Efficient Validity Verification Mechanism. In IDCS '12, pp.85-96.
-
-
-
Peng, K.1
Zhang, Y.2
-
33
-
-
84894090297
-
Efficient homomorphic sealed-bid auction free of bid validity check and equality test
-
In Security and Communication Networks. Available online MAY at DOI: 10.1002/sec.549
-
K Peng. Efficient homomorphic sealed-bid auction free of bid validity check and equality test. In Security and Communication Networks. Available online MAY 2012 at DOI: 10.1002/sec.549.
-
(2012)
-
-
Peng, K.1
|