-
3
-
-
84894098573
-
-
Cryptographic protocols for secure second-price auctions. Available from
-
B Felix. Cryptographic protocols for secure second-price auctions. 2001. Available from http://www.cs.miami.edu/~burt/learning/Csc498.043/cia2001.pdf.
-
(2001)
-
-
Felix, B.1
-
5
-
-
84947288202
-
Efficient sealed-bid auctions for massive numbers of bidders with lump comparison
-
Springer-Verlag: Berlin
-
Chida K, Kobayashi K, Morita H. Efficient sealed-bid auctions for massive numbers of bidders with lump comparison. In Information Security, 4th International Conference, ISC 200, volume 2200 of Lecture Notes in Computer Science. Springer-Verlag: Berlin, 2001; 408-419.
-
(2001)
Information Security, 4th International Conference, ISC 200, volume 2200 of Lecture Notes in Computer Science
, pp. 408-419
-
-
Chida, K.1
Kobayashi, K.2
Morita, H.3
-
7
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
Springer: Berlin
-
Cramer R, Damgård I, Nielsen JB. Multiparty computation from threshold homomorphic encryption. In EUROCRYPT '01, volume 2045 of Lecture Notes in Computer Science, Springer: Berlin, 2001; 280-299.
-
(2001)
EUROCRYPT '01, volume 2045 of Lecture Notes in Computer Science
, pp. 280-299
-
-
Cramer, R.1
Damgård, I.2
Nielsen, J.B.3
-
8
-
-
84944328129
-
Sharing decryption in the context of voting or lotteries
-
volume, Springer-Verlag: Berlin, Lecture Notes in Computer Science.
-
Fouque P-A, Poupard G, Stern J. Sharing decryption in the context of voting or lotteries. In Financial Cryptography 2000, volume 1962, Springer-Verlag: Berlin, 2000; 90-104. Lecture Notes in Computer Science.
-
(2000)
Financial Cryptography 2000
, vol.1962
, pp. 90-104
-
-
Fouque, P.-A.1
Poupard, G.2
Stern, J.3
-
10
-
-
84947558992
-
A "paradoxical" identity-based signature scheme resulting from zero-knowledge
-
Goldwasser S (ed). Springer-Verlag: Berlin
-
Guillou LC, Quisquater JJ. A "paradoxical" identity-based signature scheme resulting from zero-knowledge. In CRYPTO '88, volume 403 of Lecture Notes in Computer Science, Goldwasser S (ed). Springer-Verlag: Berlin, 1989; 216-231.
-
(1989)
CRYPTO '88, volume 403 of Lecture Notes in Computer Science
, pp. 216-231
-
-
Guillou, L.C.1
Quisquater, J.J.2
-
14
-
-
84961626294
-
Distributed auction servers resolving winner and winning bid without revealing privacy of bids
-
Kikuchi H, Hotta S, Abe K, Nakanishi S. Distributed auction servers resolving winner and winning bid without revealing privacy of bids. In Proceedings of the International Workshop on Next Generation Internet (NGITA2000), IEEE. 2000; 307-312.
-
(2000)
Proceedings of the International Workshop on Next Generation Internet (NGITA2000), IEEE
, pp. 307-312
-
-
Kikuchi, H.1
Hotta, S.2
Abe, K.3
Nakanishi, S.4
-
19
-
-
35248844566
-
Non-interactive auction scheme with strong privacy
-
Springer: Berlin
-
Peng K, Boyd C, Dawson E, Viswanathan K. Non-interactive auction scheme with strong privacy. In 5th International Conference of Information Security and Cryptology-ICISC 2002, volume 2587 of Lecture Notes in Computer Science. Springer: Berlin, 2002; 407-420.
-
(2002)
5th International Conference of Information Security and Cryptology-ICISC 2002, volume 2587 of Lecture Notes in Computer Science
, pp. 407-420
-
-
Peng, K.1
Boyd, C.2
Dawson, E.3
Viswanathan, K.4
-
20
-
-
84944045443
-
Robust, privacy protecting and publicly verifiable sealed-bid auction
-
Springer: Berlin
-
Peng K, Boyd C, Dawson E, Viswanathan K. Robust, privacy protecting and publicly verifiable sealed-bid auctionIn. In 4th International Conference of Information and Communications Security, ICICS 2002, volume 2513 of Lecture Notes in Computer Science. Springer: Berlin, 2002; 147-159.
-
(2002)
4th International Conference of Information and Communications Security, ICICS 2002, volume 2513 of Lecture Notes in Computer Science
, pp. 147-159
-
-
Peng, K.1
Boyd, C.2
Dawson, E.3
Viswanathan, K.4
-
21
-
-
33747440790
-
Batch verification of validity of bids in homomorphic e-auction
-
Peng K, Boyd C, Dawson E. Batch verification of validity of bids in homomorphic e-auction. Computer Communications 2006; 29(2006):2798-2805.
-
(2006)
Computer Communications
, vol.29
, Issue.2006
, pp. 2798-2805
-
-
Peng, K.1
Boyd, C.2
Dawson, E.3
-
24
-
-
79958782196
-
Secure e-auction for mobile users with low-capability devices in wireless networks
-
Springer-Verlag: Berlin
-
Peng K. Secure e-auction for mobile users with low-capability devices in wireless networksIn. In WISTP 2011, volume 6633 of Lecture Notes in Computer Science. Springer-Verlag: Berlin, 2011; 351-360.
-
(2011)
WISTP 2011, volume 6633 of Lecture Notes in Computer Science
, pp. 351-360
-
-
Peng, K.1
-
26
-
-
0005038557
-
A bulletin-board based digital auction scheme with bidding down strategy-towards anonymous electronic bidding without anonymous channels nor trusted centers
-
City University of Hong Kong Press: Hong Kong
-
Sakurai K, Miyazaki S. A bulletin-board based digital auction scheme with bidding down strategy-towards anonymous electronic bidding without anonymous channels nor trusted centers. In Proceedings of the International Workshop on Cryptographic Techniques and E-Commerce. City University of Hong Kong Press: Hong Kong, 1999; 180-187.
-
(1999)
Proceedings of the International Workshop on Cryptographic Techniques and E-Commerce
, pp. 180-187
-
-
Sakurai, K.1
Miyazaki, S.2
-
28
-
-
0034447261
-
Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP
-
ACM: Portland, Oregon, USA
-
Watanabe Y, Imai H. Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP. In STOC 2000, ACM: Portland, Oregon, USA, 2000; 80-86.
-
(2000)
STOC 2000
, pp. 80-86
-
-
Watanabe, Y.1
Imai, H.2
|