메뉴 건너뛰기




Volumn 2502, Issue , 2002, Pages 24-38

Bit-slice auction circuit

Author keywords

Auction; Bit slice; Circuit; Mix and match; Multiparty protocol

Indexed keywords

NETWORKS (CIRCUITS); SECURITY OF DATA; TIMING CIRCUITS;

EID: 84957041593     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45853-0_2     Document Type: Conference Paper
Times cited : (34)

References (25)
  • 1
    • 84956854310 scopus 로고    scopus 로고
    • Mix-Networks on permutation networks
    • LNCS
    • [1] M. Abe, “Mix-Networks on permutation networks,” Proc. of Asiacrypt’99, LNCS Vol. 1716, pp. 258–273 (1999).
    • (1999) Proc. Of Asiacrypt’99 , vol.1716 , pp. 258-273
    • Abe, M.1
  • 2
    • 84937409147 scopus 로고    scopus 로고
    • Remarks on Mix-Network Based on Permutation Networks
    • [2] M. Abe and F. Hoshino, “Remarks on Mix-Network Based on Permutation Networks,” Proc. of PKC 2001, pp. 317–324 (2001).
    • (2001) Proc. Of PKC 2001 , pp. 317-324
    • Abe, M.1    Hoshino, F.2
  • 3
    • 84958964379 scopus 로고    scopus 로고
    • M1-st Price Auction Using Homomorphic Encryption
    • [3] M. Abe and K. Suzuki, “M1-st Price Auction Using Homomorphic Encryption,” Proc. of PKC2002, pp. 115–124 (2002).
    • (2002) Proc. Of PKC2002 , pp. 115-124
    • Abe, M.1    Suzuki, K.2
  • 6
    • 0033280866 scopus 로고    scopus 로고
    • Efficient private bidding and auctions with an oblivious third party
    • ACM
    • [6] C. Cachin, “Efficient private bidding and auctions with an oblivious third party,” ACM CSS’99, pp. 120–127, ACM (1999).
    • (1999) ACM CSS’99 , pp. 120-127
    • Cachin, C.1
  • 7
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • [7] R. Canetti, “Security and composition of multiparty cryptographic protocols,” Journal of Cryptology, Vol. 13, No. 1, pp. 143–202 (2000).
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 8
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • [8] D. Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms,” Communications of the ACM, Vol. 24, pp. 84–88 (1981).
    • (1981) Communications of the ACM , vol.24 , pp. 84-88
    • Chaum, D.1
  • 10
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty Computation from Threshold Homomorphic Encryption
    • [10] R. Cramer, I. Damgård, and J.B. Nielsen, “Multiparty Computation from Threshold Homomorphic Encryption,” Proc. of Eurocrypt’01, LNCS Vol. 2045, pp. 280–300 (2001).
    • (2001) Proc. Of Eurocrypt’01, LNCS , vol.2045 , pp. 280-300
    • Cramer, R.1    Damgård, I.2    Nielsen, J.B.3
  • 11
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • [11] R. Cramer, I. Damgård, and B. Schoenmakers, “Proofs of partial knowledge and simplified design of witness hiding protocols,” Proc. of CRYPTO’94. LNCS Vol. 839, pp. 174–187 (1994).
    • (1994) Proc. Of CRYPTO’94. LNCS , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 14
    • 0001710760 scopus 로고    scopus 로고
    • The Design and Implementation of a Secure Auction Service
    • [14] M. Franklin and M. Reiter, “The Design and Implementation of a Secure Auction Service,” IEEE Trans. on Software Engineering, Vol. 22, No. 5 (1996).
    • (1996) IEEE Trans. On Software Engineering , vol.22 , Issue.5
    • Franklin, M.1    Reiter, M.2
  • 20
    • 84937417083 scopus 로고    scopus 로고
    • Mix and Match: Secure Function Evaluation via Ciphertexts
    • [20] M. Jakobsson and A. Juels, “Mix and Match: Secure Function Evaluation via Ciphertexts,” In Proc. of Asiacrypt 2000, LNCS Vol. 1976, pp. 162–177 (2000).
    • (2000) Proc. Of Asiacrypt 2000, LNCS , vol.1976 , pp. 162-177
    • Jakobsson, M.1    Juels, A.2
  • 23
    • 35248870807 scopus 로고    scopus 로고
    • An auction protocol which hides bids of losers
    • [23] K. Sako, “An auction protocol which hides bids of losers,” Proc. of PKC’2000, LNCS Vol. 1751, pp. 422–432 (2000).
    • (2000) Proc. Of PKC’2000, LNCS , vol.1751 , pp. 422-432
    • Sako, K.1
  • 24
    • 0018545449 scopus 로고
    • How to Share a Secret
    • [24] A. Shamir, “How to Share a Secret,” Communications of the ACM, Vol. 22, pp. 612-613 (1979).
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 25
    • 0020312165 scopus 로고
    • Protocols for secure computations (Extended abstract)
    • IEEE Computer Society
    • [25] A. Yao, “Protocols for secure computations (extended abstract),” Proc. of FOCS’82, pp. 160–164, IEEE Computer Society (1982).
    • (1982) Proc. Of FOCS’82 , pp. 160-164
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.