-
1
-
-
84957715741
-
Universally Verifiable Mix-Net with Verification Work Independent of The Number Of Mix-Servers
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
M. Abe, Universally Verifiable Mix-Net with Verification Work Independent of The Number Of Mix-Servers, in Advances in Cryptology | EUROCRYPT '98, Lecture Notes in Computer Science 1403, Springer-Verlag, Berlin, pp.437-447 (1998).
-
(1998)
Advances in Cryptology | EUROCRYPT '98
, vol.1403
, pp. 437-447
-
-
Abe, M.1
-
2
-
-
84937500008
-
A Mix-network on Permutation Networks
-
May
-
M. Abe, A Mix-network on Permutation Networks, IEICE Technical Report (May, 1999).
-
(1999)
IEICE Technical Report
-
-
Abe, M.1
-
3
-
-
84898960610
-
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
-
May
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation, Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pp.1-10 (May, 1988).
-
(1988)
Proceedings of the 20Th Annual ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
Feb
-
D. L. Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM, Vol.24, No.2, pp.84-88 (Feb., 1981).
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.L.1
-
6
-
-
0022145479
-
Transaction systems to Make Big Brother Obsolete
-
Oct
-
D. Chaum, Security without Identification: Transaction systems to Make Big Brother Obsolete, Communications of the ACM, Vol.28, No.10, pp.1030-1044 (Oct., 1985).
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
Identification, S.W.2
-
7
-
-
0023861309
-
The Dining Cryptographers Problem: Unconditional Sender and Re-cipient Untraceability
-
D. Chaum, The Dining Cryptographers Problem: Unconditional Sender and Re-cipient Untraceability, Journal of Cryptology, Vol.1, No.1, pp.65-75 (1988).
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
8
-
-
85034632918
-
Elections with Unconditionally-Secret Ballots and Disruption Equiv-alent to Breaking RSA
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
D. Chaum, Elections with Unconditionally-Secret Ballots and Disruption Equiv-alent to Breaking RSA, in Advances in Cryptology | EUROCRYPT '88, Lecture Notes in Computer Science 330, Springer-Verlag, Berlin, pp.177-182 (1988).
-
(1988)
Advances in Cryptology | EUROCRYPT '88
, vol.330
, pp. 177-182
-
-
Chaum, D.1
-
9
-
-
0041890385
-
-
WUCS-96-02, Deportment of Com-puter Science, Washington University, St. Louis (Jan
-
L. F. Cranor and R. K. Cytron, Design and Implementation of a Practical Security-Conscious Electronic Polling System, WUCS-96-02, Deportment of Com-puter Science, Washington University, St. Louis (Jan., 1996).
-
(1996)
Design and Implementation of a Practical Security-Conscious Electronic Polling System
-
-
Cranor, L.F.1
Cytron, R.K.2
-
10
-
-
84898947315
-
Multiparty Unconditionally Secure Protocols
-
May
-
D. Chaum, C. Crépeau, and I. Damgård, Multiparty Unconditionally Secure Protocols, Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pp.11-19 (May, 1988).
-
(1988)
Proceedings of the 20Th Annual ACM Symposium on Theory of Computing
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
11
-
-
77951106449
-
Multi-Authority Secret-Ballot Elections with Linear Work
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
R. Cramer, M. Franklin, B. Schoenmakers, and M. Yung, Multi-Authority Secret-Ballot Elections with Linear Work, in Advances in Cryptology | EURO-CRYPT '96, Lecture Notes in Computer Science 1070, Springer-Verlag, Berlin, pp.72-83 (1996).
-
(1996)
Advances in Cryptology | EURO-CRYPT '96
, vol.1070
, pp. 72-83
-
-
Cramer, R.1
Franklin, M.2
Schoenmakers, B.3
Yung, M.4
-
13
-
-
84957375076
-
A Secure and Optimally Efficient Multi-Authority Election Scheme
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
R. Cramer, R. Gennaro, and B. Schoenmakers, A Secure and Optimally Efficient Multi-Authority Election Scheme, in Advances in Cryptology | EURO-CRYPT '97, Lecture Notes in Computer Science 1233, Springer-Verlag, Berlin, pp.103-118 (1997).
-
(1997)
Advances in Cryptology | EURO-CRYPT '97
, vol.1233
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
14
-
-
84948962858
-
Blind Signatures based on the Discrete Logarithm Problem
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
J. Camenisch, J. Pireteau, and M. Stadler, Blind Signatures based on the Discrete Logarithm Problem, in Advances in Cryptology | EUROCRYPT '94, Lecture Notes in Computer Science 950, Springer-Verlag, Berlin, pp.428-432 (?1994?).
-
(1994)
Advances in Cryptology | EUROCRYPT '94
, vol.950
, pp. 428-432
-
-
Camenisch, J.1
Pireteau, J.2
Stadler, M.3
-
15
-
-
85023809951
-
Threshold Cryptosystems
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
Y. G. Desmedt and Y. Frankel, Threshold Cryptosystems, in Advances in Cryp-tology | CRYPTO '89, Lecture Notes in Computer Science 435, Springer-Verlag, Berlin, pp.307-315 (1990).
-
(1990)
Advances in Cryp-Tology | CRYPTO '89
, vol.435
, pp. 307-315
-
-
Desmedt, Y.G.1
Frankel, Y.2
-
16
-
-
0017018484
-
New Directions in Cryptography
-
Nov
-
W. Diffie and M. E. Hellman, New Directions in Cryptography, IEEE Transac-tions on Information Theory, Vol.IT-22, No.6, pp.644-654 (Nov., 1976).
-
(1976)
IEEE Transac-Tions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
17
-
-
77954124943
-
A Practical Secret Voting Scheme for Large Scale Elections
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
A. Fujioka, T. Okamoto, and K. Ohta. A Practical Secret Voting Scheme for Large Scale Elections, in Advances in Cryptology | AUSCRYPT '92, Lecture Notes in Computer Science 718, Springer-Verlag, Berlin, pp.244-251 (1993).
-
(1993)
Advances in Cryptology | AUSCRYPT '92
, vol.718
, pp. 244-251
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
18
-
-
0023545076
-
How to Play Any Mental Game or a Completeness Theorem for Protocols with Honest Majority
-
May
-
O. Goldreich, S. Micali, and A. Wigderson, How to Play Any Mental Game or a Completeness Theorem for Protocols with Honest Majority, Proceedings of the 19th Annual ACM Symposium on Theory of Computing, pp.218-229 (May, 1987).
-
(1987)
Proceedings of the 19Th Annual ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
20
-
-
84957709438
-
A Practical Mix
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
M. Jakobsson, A Practical Mix, in Advances in Cryptology | EUROCRYPT '98, Lecture Notes in Computer Science 1403, Springer-Verlag, Berlin, pp.448-461 (1998).
-
(1998)
Advances in Cryptology | EUROCRYPT '98
, vol.1403
, pp. 448-461
-
-
Jakobsson, M.1
-
22
-
-
85027158725
-
Efficient Anonymous Channel and All/Nothing Election Scheme
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
C. Park, K. Itoh, and K. Kurosawa, Efficient Anonymous Channel and All/Nothing Election Scheme, in Advances in Cryptology | EUROCRYPT '93, Lecture Notes in Computer Science 765, Springer-Verlag, Berlin, pp.248-259 (1994).
-
(1994)
Advances in Cryptology | EUROCRYPT '93
, vol.765
, pp. 248-259
-
-
Park, C.1
Itoh, K.2
Kurosawa, K.3
-
23
-
-
0002986502
-
Fault Tolerant Anonymous Channel
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
W. Ogata, K. Kurosawa, K. Sako, and K. Takatani, Fault Tolerant Anonymous Channel, in ICICS98, Lecture Notes in Computer Science 1334, Springer-Verlag, Berlin, pp.440-444 (1998).
-
(1998)
ICICS98
, vol.1334
, pp. 440-444
-
-
Ogata, W.1
Kurosawa, K.2
Sako, K.3
Takatani, K.4
-
24
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
Feb
-
R. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, Vol. 21, No. 2, pp. 120-126 (Feb., 1978).
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
25
-
-
0000089246
-
Efficient Signature Generation for Smart Cards
-
C. P. Schnorr, Efficient Signature Generation for Smart Cards, Journal of Cryp-tology, Vol.3, No.4, pp.239-252 (1991).
-
(1991)
Journal of Cryp-Tology
, vol.3
, Issue.4
, pp. 239-252
-
-
Schnorr, C.P.1
-
27
-
-
84955615815
-
Secure Voting using Partially Compatible Homomor-phisms
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
K. Sako and J. Kilian, Secure Voting using Partially Compatible Homomor-phisms, in Advances in Cryptology | CRYPTO '94, Lecture Notes in Computer Science 839, Springer-Verlag, Berlin, pp.411-424 (1994).
-
(1994)
Advances in Cryptology | CRYPTO '94
, vol.839
, pp. 411-424
-
-
Sako, K.1
Kilian, J.2
-
28
-
-
84957356080
-
Receipt-Free Mix-Type Voting Scheme | A Practical Solution to the Implementation of a Voting Booth
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
K. Sako and J. Kilian, Receipt-Free Mix-Type Voting Scheme | A Practical Solution to the Implementation of a Voting Booth |, in Advances in Cryptology | EUROCRYPT '95, Lecture Notes in Computer Science 921, Springer-Verlag, Berlin, pp.393-403 (1995).
-
(1995)
Advances in Cryptology | EUROCRYPT '95
, vol.921
, pp. 393-403
-
-
Sako, K.1
Kilian, J.2
|