-
1
-
-
84921482714
-
-
[Online]
-
[Online]. Available: https://immersion.media.mit.edu/
-
-
-
-
2
-
-
84855974342
-
Cloud data protection for the masses
-
D. Song, E. Shi, I. Fischer, and U. Shankar, "Cloud Data Protection for the Masses, " IEEE Computer, vol. 45, no. 1, pp. 39-45, 2012.
-
(2012)
IEEE Computer
, vol.45
, Issue.1
, pp. 39-45
-
-
Song, D.1
Shi, E.2
Fischer, I.3
Shankar, U.4
-
3
-
-
84862907810
-
Security challenges for the public cloud
-
K. Ren, C. Wang, and Q. Wang, "Security Challenges for the Public Cloud, " IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.
-
(2012)
IEEE Internet Computing
, vol.16
, Issue.1
, pp. 69-73
-
-
Ren, K.1
Wang, C.2
Wang, Q.3
-
4
-
-
84921494946
-
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
-
A. López, E. Tromer, and V. Vaikuntanathan, "On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption, " in Proc. of STOC 2012, 2012.
-
(2012)
Proc. of STOC 2012
-
-
López, A.1
Tromer, E.2
Vaikuntanathan, V.3
-
5
-
-
77954592905
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry, "Fully Homomorphic Encryption Using Ideal Lattices, " in Proc. of STOC'09, 2009.
-
(2009)
Proc. of STOC'09
-
-
Gentry, C.1
-
6
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
M. van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, "Fully Homomorphic Encryption over the Integers, " in Proc. of Eurocrypt, 2010, pp. 24-43.
-
Proc. of Eurocrypt
, vol.2010
, pp. 24-43
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
7
-
-
80955132201
-
Efficient Fully Homomorphic Encryption from (Standard) LWE
-
Z. Brakerski and V. Vaikuntanathan, "Efficient Fully Homomorphic Encryption from (Standard) LWE, " in Proc. of FOCS'11, 2011.
-
(2011)
Proc. of FOCS'11
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
8
-
-
0020312165
-
Protocols for Secure Computations
-
A. Yao, "Protocols for Secure Computations, " in Proc. of FOCS, 1982, pp. 160-164.
-
(1982)
Proc. of FOCS
, pp. 160-164
-
-
Yao, A.1
-
9
-
-
84879821906
-
Reusable garbled circuits and succinct functional encryption
-
S. Goldwasser, Y. Kalai, R. A. Popa, V. Vaikuntanathan, and N. Zel-dovich, "Reusable Garbled Circuits and Succinct Functional Encryption, " in Proc. of STOC'13, 2013.
-
(2013)
Proc. of STOC'13
-
-
Goldwasser, S.1
Kalai, Y.2
Popa, R.A.3
Vaikuntanathan, V.4
Zel-Dovich, N.5
-
10
-
-
84888390701
-
Efficiently outsourcing multiparty computation under multiple keys
-
A. Peter, E. Tews, and S. Katzenbeisser, "Efficiently Outsourcing Multiparty Computation Under Multiple Keys, " IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 2046-2058, 2013.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.12
, pp. 2046-2058
-
-
Peter, A.1
Tews, E.2
Katzenbeisser, S.3
-
11
-
-
0345058960
-
A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications
-
E. Bresson, D. Catalano, and D. Pointcheval, "A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications, " in Proc. of ASIACRYPT'03, 2003, pp. 37-54.
-
(2003)
Proc. of ASIACRYPT'03
, pp. 37-54
-
-
Bresson, E.1
Catalano, D.2
Pointcheval, D.3
-
12
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage, " in Proc. of NDSS'05, 2005.
-
(2005)
Proc. of NDSS'05
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
13
-
-
84969931080
-
On the impossibility of cryptography alone for privacy-preserving cloud computing
-
M. van Dijk and A. Juels, "On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing, " in Proc. of HotSec'10. USENIX, 2010, pp. 1-8.
-
Proc. of HotSec'10. USENIX
, vol.2010
, pp. 1-8
-
-
Van Dijk, M.1
Juels, A.2
-
14
-
-
84901750940
-
Secure k-nearest neighbor query over encrypted data in outsourced environments
-
Y. Elmehdwi, B. Samanthula, and W. Jiang, "Secure k-Nearest Neighbor Query over Encrypted Data in Outsourced Environments, " in Proc. of IEEE ICDE'14, 2014.
-
(2014)
Proc. of IEEE ICDE'14
-
-
Elmehdwi, Y.1
Samanthula, B.2
Jiang, W.3
-
15
-
-
84921338933
-
Outsource-able two-party privacy-preserving biometric authentication
-
H. Chun, Y. Elmehdwi, F. Li, P. Bhattacharya, and W. Jiang, "Outsource-able Two-Party Privacy-Preserving Biometric Authentication, " in Proc. of ACM ASIACCS'14, 2014.
-
(2014)
Proc. of ACM ASIACCS'14
-
-
Chun, H.1
Elmehdwi, Y.2
Li, F.3
Bhattacharya, P.4
Jiang, W.5
-
16
-
-
84989843534
-
Computing encrypted cloud data efficiently under multiple keys
-
B. Wang, M. Li, S. S. M. Chow, and H. Li, "Computing Encrypted Cloud Data Efficiently under Multiple Keys, " in Proc. of CNS-SPCC, 2013.
-
(2013)
Proc. of CNS-SPCC
-
-
Wang, B.1
Li, M.2
Chow, S.S.M.3
Li, H.4
-
18
-
-
84881255209
-
Privacy-preserving ridge regression on hundred of millions of records
-
V. Nikolaenko, U. Weinsberg, S. Ioannidis, M. Joye, D. Boneh, and N. Taft, "Privacy-Preserving Ridge Regression on Hundred of Millions of Records, " in Proc. of IEEE S&P'13, 2013.
-
(2013)
Proc. of IEEE S&P'13
-
-
Nikolaenko, V.1
Weinsberg, U.2
Ioannidis, S.3
Joye, M.4
Boneh, D.5
Taft, N.6
-
20
-
-
0002513231
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti, "Universally Composable Security: A New Paradigm for Cryptographic Protocols, " in Proc. of FOCS'01, 2001.
-
(2001)
Proc. of FOCS'01
-
-
Canetti, R.1
-
21
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions, " in Proc. of ACM CCS'06, 2006.
-
(2006)
Proc. of ACM CCS'06
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
22
-
-
84869394463
-
Dynamic searchable symmetric encryption
-
S. Kamara, C. Papamanthou, and T. Roeder, "Dynamic Searchable Symmetric Encryption, " in Proc. of ACM CCS'12, 2012, pp. 965-976.
-
Proc. of ACM CCS'12
, vol.2012
, pp. 965-976
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
23
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
M. Blaze, G. Bleumer, and M. Strauss, "Divertible Protocols and Atomic Proxy Cryptography, " in Proc. of Eurocrypt, 1998, pp. 127-144.
-
(1998)
Proc. of Eurocrypt
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
24
-
-
85064961697
-
Efficient unidirectional proxy re-encryption
-
S. S. M. Chow, J. Weng, Y. Yang, and R. H. Deng, "Efficient Unidirectional Proxy Re-Encryption, " in Proc. of AfricaCrypt'10, 2010.
-
(2010)
Proc. of AfricaCrypt'10
-
-
Chow, S.S.M.1
Weng, J.2
Yang, Y.3
Deng, R.H.4
-
25
-
-
84871555906
-
Enhanced flexibility for homomor-phic encryption schemes via CRT
-
Y. Hu, W. J. Martin, and B. Sunar, "Enhanced Flexibility for Homomor-phic Encryption Schemes via CRT, " in Proc. of ACNS'12, 2012.
-
(2012)
Proc. of ACNS'12
-
-
Hu, Y.1
Martin, W.J.2
Sunar, B.3
-
26
-
-
84966238549
-
Monte Carlo methods for index computation mod p
-
J. M. Pollard, "Monte Carlo Methods for Index Computation mod p, " Mathematics of Computation, vol. 32, no. 143, 918-924 1978.
-
(1978)
Mathematics of Computation
, vol.32
, Issue.143
, pp. 918-924
-
-
Pollard, J.M.1
-
28
-
-
84921489316
-
-
[Online]
-
[Online]. Available: http://crypto.stanford.edu/pbc/
-
-
-
-
29
-
-
0023545076
-
How to play ANY mental game
-
O. Goldreich, S. Micali, and A. Wigderson, "How to play ANY mental game, " in Proc. of STOC, 1987, pp. 218-229.
-
(1987)
Proc. of STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
30
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
D. Chaum, C. Crepeau, and I. Damgård, "Multiparty Unconditionally Secure Protocols, " in Proc. of STOC, 1988, pp. 11-19.
-
(1988)
Proc. of STOC
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgård, I.3
-
31
-
-
79958004492
-
Semi-homomorphic encryption and multiparty computation
-
R. Bendlin, I. Damgård, C. Orlandi, and S. Zakarias, "Semi-homomorphic Encryption and Multiparty Computation, " in Proc. of Eurocrypt, 2011, pp. 169-188.
-
(2011)
Proc. of Eurocrypt
, pp. 169-188
-
-
Bendlin, R.1
Damgård, I.2
Orlandi, C.3
Zakarias, S.4
-
32
-
-
79955532534
-
Fully homomorphic encryption with relatively small key and ciphertext sizes
-
N. P. Smart and F. Vercauteren, "Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes, " in Proc. of PKC, 2010, pp. 420-443.
-
(2010)
Proc. of PKC
, pp. 420-443
-
-
Smart, N.P.1
Vercauteren, F.2
-
33
-
-
80051976682
-
Secure computation on the web: Computing without simultaneous interaction
-
S. Halevi, Y. Lindell, and B. Pinkas, "Secure Computation on the Web: Computing without Simultaneous Interaction, " in Proc. of CRYPTO'11, 2011, pp. 132-150.
-
(2011)
Proc. of CRYPTO'11
, pp. 132-150
-
-
Halevi, S.1
Lindell, Y.2
Pinkas, B.3
-
35
-
-
84869441394
-
Salus: A system for server-aided secure function evaluation
-
S. Kamara, P. Mohassel, and B. Riva, "Salus: A System for Server-Aided Secure Function Evaluation, " in Proc. of ACM CCS'12, 2012, pp. 797-808.
-
(2012)
Proc. of ACM CCS'12
, pp. 797-808
-
-
Kamara, S.1
Mohassel, P.2
Riva, B.3
-
36
-
-
79960885939
-
Two-party computation model for privacy-preserving queries over distributed databases
-
S. S. M. Chow, J.-H. Lee, and L. Subramanian, "Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases, " in Proc. of NDSS'09, 2009.
-
(2009)
Proc. of NDSS'09
-
-
Chow, S.S.M.1
Lee, J.-H.2
Subramanian, L.3
-
37
-
-
79960862322
-
Secure and practical outsourcing of linear programming in cloud computing
-
C. Wang, K. Ren, and J. Wang, "Secure and Practical Outsourcing of Linear Programming in Cloud Computing, " in Proc. of INFOCOM, 2011, pp. 820-828.
-
(2011)
Proc. of INFOCOM
, pp. 820-828
-
-
Wang, C.1
Ren, K.2
Wang, J.3
-
38
-
-
80051894689
-
Harnessing the cloud for securely solving large-scale systems of linear equations
-
C. Wang, K. Ren, J. Wang, and K. M. R. Urs, "Harnessing the Cloud for Securely Solving Large-scale Systems of Linear Equations, " in Proc. of ICDCS, 2011.
-
(2011)
Proc. of ICDCS
-
-
Wang, C.1
Ren, K.2
Wang, J.3
Urs, K.M.R.4
|