메뉴 건너뛰기




Volumn 2339, Issue , 2002, Pages 364-377

Non-interactive private auctions

Author keywords

Auctions; Bidding; Homomorphic encryption; Secure circuit evaluation

Indexed keywords

CHROMIUM COMPOUNDS; COMMERCE;

EID: 84949207060     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-46088-8_28     Document Type: Conference Paper
Times cited : (28)

References (23)
  • 1
    • 0006480739 scopus 로고    scopus 로고
    • Auctions on the internet: A field study. Working Paper 98-WP-103
    • Haas School of Business, University of California, Berkeley
    • C. Beam and A. Segev. Auctions on the internet: A field study. Working Paper 98-WP-103, Fisher Center for Management and Information Technology, Haas School of Business, University of California, Berkeley, 1998.
    • (1998) Fisher Center for Management and Information Technology
    • Beam, C.1    Segev, A.2
  • 2
    • 84898960610 scopus 로고
    • Completeness theorems for noncryptographic fault-tolerant distributed computing
    • M. Ben-Or, S. Goldwasser, and A. Widgerson. Completeness theorems for noncryptographic fault-tolerant distributed computing. In Proceedings of the 20th STOC, ACM, pages 1-10, 1988.
    • (1988) Proceedings of the 20Th STOC, ACM , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Widgerson, A.3
  • 3
    • 84949265460 scopus 로고    scopus 로고
    • Efficient Private Bidding and Auctions with an Oblivious Third Party
    • C. Cachin. Efficient Private Bidding and Auctions with an Oblivious Third Party. IBM research Report RZ 3131, 1999.
    • (1999) IBM Research Report RZ 3131
    • Cachin, C.1
  • 4
    • 84957610863 scopus 로고    scopus 로고
    • Proving that a Number Is the Product of Two Safe Primes
    • Springer-Verlag
    • J. Camenisch and M. Michels. Proving that a Number Is the Product of Two Safe Primes. In Eurocrypt’99, LNCS 1592, pages 107-122. Springer-Verlag, 1999.
    • (1999) Eurocrypt’99, LNCS 1592 , pp. 107-122
    • Camenisch, J.1    Michels, M.2
  • 5
    • 0002882557 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups
    • Springer-Verlag
    • J. Camenish and M. Stadler. Efficient group signature schemes for large groups. In Crypto’97, LNCS 1294, pages 17-21. Springer-Verlag, 1997.
    • (1997) Crypto’97, LNCS 1294 , pp. 17-21
    • Camenish, J.1    Stadler, M.2
  • 7
    • 0001853827 scopus 로고
    • Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
    • CSR9413
    • R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. Technical report, CWI, 1994. CSR9413.
    • (1994) Technical Report, CWI
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 9
    • 33750826658 scopus 로고
    • Secure Fault-tolerant Protocols and the Public-Key Model
    • Springer-Verlag
    • Z. Galil, S. Haber, and M. Yung. Secure Fault-tolerant Protocols and the Public-Key Model. In Crypto’87. Springer-Verlag, 1987.
    • (1987) Crypto’87
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 11
    • 0141653334 scopus 로고
    • How to Solve any Protocol Problem-An efficiency Improvement
    • Springer-Verlag
    • O. Goldreich and R. Vainish. How to Solve any Protocol Problem-An efficiency Improvement. In Crypto’87. Springer-Verlag, 1987.
    • (1987) Crypto’87
    • Goldreich, O.1    Vainish, R.2
  • 13
    • 84959165880 scopus 로고
    • A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory
    • Springer-Verlag
    • L. C. Guillou and J.-J. Quisquater. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory. In Eurocrypt’88, LNCS 330, pages 123-128. Springer-Verlag, 1988.
    • (1988) Eurocrypt’88, LNCS 330 , pp. 123-128
    • Guillou, L.C.1    Quisquater, J.-J.2
  • 16
    • 84957366256 scopus 로고    scopus 로고
    • A New Public-Key Cryptosystem
    • Springer-Verlag
    • D. Naccache and J. Stern. A New Public-Key Cryptosystem. In Eurocrypt’97, LNCS 1233, pages 27-36. Springer-Verlag, 1997.
    • (1997) Eurocrypt’97, LNCS 1233 , pp. 27-36
    • Naccache, D.1    Stern, J.2
  • 17
    • 84956852274 scopus 로고    scopus 로고
    • A New Public Key Cryptosystem as Secure as Factoring
    • Springer-Verlag
    • T. Okamoto and S. Uchiyama. A New Public Key Cryptosystem as Secure as Factoring. In Eurocrypt’98, LNCS 1403, pages 308-318. Springer-Verlag, 1998.
    • (1998) Eurocrypt’98, LNCS 1403 , pp. 308-318
    • Okamoto, T.1    Uchiyama, S.2
  • 18
    • 0000277371 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Discrete Logarithms Residues
    • Springer-Verlag
    • P. Paillier. Public-Key Cryptosystems Based on Discrete Logarithms Residues. In Eurocrypt’99, LNCS. Springer-Verlag, 1999.
    • (1999) Eurocrypt’99, LNCS
    • Paillier, P.1
  • 20
    • 84957640282 scopus 로고    scopus 로고
    • Security Analysis of a Practical “on the fly” Authentication and Signature Generation
    • Springer-Verlag
    • G. Poupard and J. Stern. Security Analysis of a Practical “on the fly” Authentication and Signature Generation. In Eurocrypt’98, LNCS 1403, pages 422-436. Springer-Verlag, 1998.
    • (1998) Eurocrypt’98, LNCS 1403 , pp. 422-436
    • Poupard, G.1    Stern, J.2
  • 22
    • 0018545449 scopus 로고
    • How to Share a Secret
    • November
    • A. Shamir. How to Share a Secret. Communications of the ACM, 22:612-613, November 1979.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 23
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • IEEE
    • A. Yao. How to generate and exchange secrets. In Proc. of the 27th FOCS, pages 162-167. IEEE, 1986.
    • (1986) Proc. Of the 27Th FOCS , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.