-
1
-
-
84956854310
-
Mix-Networks on permutation networks
-
LNCS
-
[1] M. Abe, “Mix-Networks on permutation networks,” Proc. of Asiacrypt’99, LNCS Vol. 1716, pp. 258–273 (1999).
-
(1999)
Proc. Of Asiacrypt’99
, vol.1716
, pp. 258-273
-
-
Abe, M.1
-
2
-
-
84937409147
-
Remarks on Mix-Network Based on Permutation Networks
-
[2] M. Abe and F. Hoshino, “Remarks on Mix-Network Based on Permutation Networks,” Proc. of PKC 2001, pp. 317–324 (2001).
-
(2001)
Proc. Of PKC 2001
, pp. 317-324
-
-
Abe, M.1
Hoshino, F.2
-
3
-
-
84958964379
-
M1-st Price Auction Using Homomorphic Encryption
-
[3] M. Abe and K. Suzuki, “M1-st Price Auction Using Homomorphic Encryption,” Proc. of PKC2002, pp. 115–124 (2002).
-
(2002)
Proc. Of PKC2002
, pp. 115-124
-
-
Abe, M.1
Suzuki, K.2
-
5
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computation
-
May 2–4
-
[5] M. Ben-Or, S. Goldwasser, and A. Wigderson. “Completeness theorems for noncryptographic fault-tolerant distributed computation,” Proceedings of the twentieth annual ACM Symp. Theory of Computing, STOC, pp. 1–10, May 2–4 (1988).
-
(1988)
Proceedings of the Twentieth Annual ACM Symp. Theory of Computing, STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
0033280866
-
Efficient private bidding and auctions with an oblivious third party
-
ACM
-
[6] C. Cachin, “Efficient private bidding and auctions with an oblivious third party,” ACM CSS’99, pp. 120–127, ACM (1999).
-
(1999)
ACM CSS’99
, pp. 120-127
-
-
Cachin, C.1
-
7
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
[7] R. Canetti, “Security and composition of multiparty cryptographic protocols,” Journal of Cryptology, Vol. 13, No. 1, pp. 143–202 (2000).
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
8
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
[8] D. Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms,” Communications of the ACM, Vol. 24, pp. 84–88 (1981).
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
9
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
May 2–4
-
[9] D. Chaum, C. Crépeau, and I. Damgåard. “Multiparty unconditionally secure protocols,” Proc. of the twentieth annual ACM Symp. Theory of Computing, STOC, pp. 11–19, May 2–4 (1988).
-
(1988)
Proc. Of the Twentieth Annual ACM Symp. Theory Of Computing, STOC
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgåard, I.3
-
10
-
-
84945124606
-
Multiparty Computation from Threshold Homomorphic Encryption
-
[10] R. Cramer, I. Damgård, and J.B. Nielsen, “Multiparty Computation from Threshold Homomorphic Encryption,” Proc. of Eurocrypt’01, LNCS Vol. 2045, pp. 280–300 (2001).
-
(2001)
Proc. Of Eurocrypt’01, LNCS
, vol.2045
, pp. 280-300
-
-
Cramer, R.1
Damgård, I.2
Nielsen, J.B.3
-
11
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
[11] R. Cramer, I. Damgård, and B. Schoenmakers, “Proofs of partial knowledge and simplified design of witness hiding protocols,” Proc. of CRYPTO’94. LNCS Vol. 839, pp. 174–187 (1994).
-
(1994)
Proc. Of CRYPTO’94. LNCS
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
14
-
-
0001710760
-
The Design and Implementation of a Secure Auction Service
-
[14] M. Franklin and M. Reiter, “The Design and Implementation of a Secure Auction Service,” IEEE Trans. on Software Engineering, Vol. 22, No. 5 (1996).
-
(1996)
IEEE Trans. On Software Engineering
, vol.22
, Issue.5
-
-
Franklin, M.1
Reiter, M.2
-
15
-
-
84947926543
-
Robust threshold DSS signatures
-
[15] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, “Robust threshold DSS signatures,” In Proc of Eurocrypt’96, LNCS Vol. 1070, pp. 354–371 (1996).
-
(1996)
Proc of Eurocrypt’96, LNC
, vol.1070
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
16
-
-
0023545076
-
How to play any mental game
-
May 25–27
-
[16] O. Goldreich, S. Micali, and A. Wigderson. “How to play any mental game,” In Proceedings of the nineteenth annual ACM Symp. Theory of Computing, STOC, pp. 218–229, May 25–27 (1987).
-
(1987)
Proceedings of the Nineteenth Annual ACM Symp. Theory of Computing, STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
17
-
-
35248861868
-
Efficient secure multiparty computation
-
[17] M. Hirt, U. Maurer, and B. Przydatek, “Efficient secure multiparty computation,” Proc. of Asiacrypt’2000, LNCS Vol. 1976, pp. 143–161 (2000).
-
(2000)
Proc. Of Asiacrypt’2000, LNCS
, vol.1976
, pp. 143-161
-
-
Hirt, M.1
Maurer, U.2
Przydatek, B.3
-
20
-
-
84937417083
-
Mix and Match: Secure Function Evaluation via Ciphertexts
-
[20] M. Jakobsson and A. Juels, “Mix and Match: Secure Function Evaluation via Ciphertexts,” In Proc. of Asiacrypt 2000, LNCS Vol. 1976, pp. 162–177 (2000).
-
(2000)
Proc. Of Asiacrypt 2000, LNCS
, vol.1976
, pp. 162-177
-
-
Jakobsson, M.1
Juels, A.2
-
22
-
-
84883898504
-
Privacy preserving auctions and mechanism design
-
ACM
-
[22] M. Naor, B. Pinkas, and R. Sumner, “Privacy preserving auctions and mechanism design,” In 1st ACM Conference on Electronic Commerce, pp. 129–140, ACM (1999).
-
(1999)
1St ACM Conference on Electronic Commerce
, pp. 129-140
-
-
Naor, M.1
Pinkas, B.2
Sumner, R.3
-
23
-
-
35248870807
-
An auction protocol which hides bids of losers
-
[23] K. Sako, “An auction protocol which hides bids of losers,” Proc. of PKC’2000, LNCS Vol. 1751, pp. 422–432 (2000).
-
(2000)
Proc. Of PKC’2000, LNCS
, vol.1751
, pp. 422-432
-
-
Sako, K.1
-
24
-
-
0018545449
-
How to Share a Secret
-
[24] A. Shamir, “How to Share a Secret,” Communications of the ACM, Vol. 22, pp. 612-613 (1979).
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
25
-
-
0020312165
-
Protocols for secure computations (Extended abstract)
-
IEEE Computer Society
-
[25] A. Yao, “Protocols for secure computations (extended abstract),” Proc. of FOCS’82, pp. 160–164, IEEE Computer Society (1982).
-
(1982)
Proc. Of FOCS’82
, pp. 160-164
-
-
Yao, A.1
|