-
1
-
-
36048954205
-
Towards a theory of data entanglement
-
J. Aspnes, J. Feigenbaum, A. Yampolskiy, and S. Zhong. Towards a theory of data entanglement. Theor. Comput. Sci., 389(1-2):26-43, 2007.
-
(2007)
Theor. Comput. Sci.
, vol.389
, Issue.1-2
, pp. 26-43
-
-
Aspnes, J.1
Feigenbaum, J.2
Yampolskiy, A.3
Zhong, S.4
-
2
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song. Provable data possession at untrusted stores. In ACM CCS, pages 598-609, 2007.
-
(2007)
ACM CCS
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.C.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.N.J.6
Song, D.X.7
-
4
-
-
72449185582
-
Proofs of storage from homomorphic identification protocols
-
G. Ateniese, S. Kamara, and J. Katz. Proofs of storage from homomorphic identification protocols. In ASIACRYPT, pages 319-333, 2009.
-
(2009)
ASIACRYPT
, pp. 319-333
-
-
Ateniese, G.1
Kamara, S.2
Katz, J.3
-
5
-
-
70249129465
-
Scalable and efficient provable data possession
-
G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik. Scalable and efficient provable data possession. In Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm'08, pages 9:1-9:10, 2008.
-
(2008)
Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, SecureComm'08
, pp. 91-910
-
-
Ateniese, G.1
Pietro, R.D.2
Mancini, L.V.3
Tsudik, G.4
-
6
-
-
0024940038
-
Non-cryptographic fault-tolerant computing in constant number of rounds of interaction
-
J. Bar-Ilan and D. Beaver. Non-cryptographic fault-tolerant computing in constant number of rounds of interaction. In PODC, pages 201-209, 1989.
-
(1989)
PODC
, pp. 201-209
-
-
Bar-Ilan, J.1
Beaver, D.2
-
7
-
-
84856466374
-
(Leveled) fully homomorphic encryption without bootstrapping
-
to appear
-
Z. Brakerski, C. Gentry, and V. Vaikuntanathan. (Leveled) Fully Homomorphic Encryption without Bootstrapping. In ITCS, page to appear, 2012.
-
(2012)
ITCS
-
-
Brakerski, Z.1
Gentry, C.2
Vaikuntanathan, V.3
-
8
-
-
80955132201
-
Efficient fully homomorphic encryption from (standard) LWE
-
Z. Brakerski and V. Vaikuntanathan. Efficient fully homomorphic encryption from (standard) LWE. In FOCS, pages 97-106, 2011.
-
(2011)
FOCS
, pp. 97-106
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
9
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In FOCS, pages 136-145, 2001.
-
(2001)
FOCS
, pp. 136-145
-
-
Canetti, R.1
-
10
-
-
84948973494
-
Exposure-resilient functions and all-or-nothing transforms
-
R. Canetti, Y. Dodis, S. Halevi, E. Kushilevitz, and A. Sahai. Exposure-resilient functions and all-or-nothing transforms. In EUROCRYPT, pages 453-469, 2000.
-
(2000)
EUROCRYPT
, pp. 453-469
-
-
Canetti, R.1
Dodis, Y.2
Halevi, S.3
Kushilevitz, E.4
Sahai, A.5
-
11
-
-
84873949927
-
Rate-limited secure function evaluation: Definitions and constructions
-
Ö. Dagdelen, P. Mohassel, and D. Venturi. Rate-limited secure function evaluation: Definitions and constructions. In PKC, pages 461-478, 2013.
-
(2013)
PKC
, pp. 461-478
-
-
Dagdelen, Ö.1
Mohassel, P.2
Venturi, D.3
-
12
-
-
85026942567
-
A multi-party protocol for privacy-preserving cooperative linear systems of equations
-
To appear
-
Ö. Dagdelen and D. Venturi. A multi-party protocol for privacy-preserving cooperative linear systems of equations. In BalkancryptSec, 2014. To appear.
-
(2014)
BalkancryptSec
-
-
Dagdelen, Ö.1
Venturi, D.2
-
14
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
Y. Dodis, S. P. Vadhan, and D. Wichs. Proofs of retrievability via hardness amplification. In TCC, pages 109-127, 2009.
-
(2009)
TCC
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.P.2
Wichs, D.3
-
15
-
-
84946827596
-
Threshold cryptosystems secure against chosen-ciphertext attacks
-
P.-A. Fouque and D. Pointcheval. Threshold cryptosystems secure against chosen-ciphertext attacks. In ASIACRYPT, pages 351-368, 2001.
-
(2001)
ASIACRYPT
, pp. 351-368
-
-
Fouque, P.-A.1
Pointcheval, D.2
-
16
-
-
0031628398
-
Simplified VSS and fact-track multiparty computations with applications to threshold cryptography
-
R. Gennaro, M. O. Rabin, and T. Rabin. Simplified VSS and fact-track multiparty computations with applications to threshold cryptography. In PODC, pages 101-111, 1998.
-
(1998)
PODC
, pp. 101-111
-
-
Gennaro, R.1
Rabin, M.O.2
Rabin, T.3
-
17
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC, pages 169-178, 2009.
-
(2009)
STOC
, pp. 169-178
-
-
Gentry, C.1
-
18
-
-
0003691180
-
-
Cambridge University Press, New York, NY, USA
-
O. Goldreich. Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, New York, NY, USA, 2004.
-
(2004)
Foundations of Cryptography: Volume 2, Basic Applications
-
-
Goldreich, O.1
-
19
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In STOC, pages 218-229, 1987.
-
(1987)
STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
20
-
-
84945966781
-
Oblivious polynomial evaluation and secure set-intersection from algebraic prfs
-
2015
-
C. Hazay. Oblivious polynomial evaluation and secure set-intersection from algebraic prfs. IACR Cryptology ePrint Archive, 2015:4, 2015.
-
(2015)
IACR Cryptology EPrint Archive
, pp. 4
-
-
Hazay, C.1
-
21
-
-
84924354505
-
Efficient oblivious polynomial evaluation with simulation-based security
-
2009
-
C. Hazay and Y. Lindell. Efficient oblivious polynomial evaluation with simulation-based security. IACR Cryptology ePrint Archive, 2009:459, 2009.
-
(2009)
IACR Cryptology EPrint Archive
, pp. 459
-
-
Hazay, C.1
Lindell, Y.2
-
22
-
-
74049103479
-
PoRs: Proofs of retrievability for large files
-
A. Juels and B. S. K. Jr. PoRs: proofs of retrievability for large files. In ACM CCS, pages 584-597, 2007.
-
(2007)
ACM CCS
, pp. 584-597
-
-
Juels, A.1
-
23
-
-
33745868262
-
Efficient polynomial operations in the shared-coefficients setting
-
P. Mohassel and M. K. Franklin. Efficient polynomial operations in the shared-coefficients setting. In PKC, pages 44-57, 2006.
-
(2006)
PKC
, pp. 44-57
-
-
Mohassel, P.1
Franklin, M.K.2
-
24
-
-
33748605569
-
The complexity of online memory checking
-
M. Naor and G. N. Rothblum. The complexity of online memory checking. In FOCS, pages 573-584, 2005.
-
(2005)
FOCS
, pp. 573-584
-
-
Naor, M.1
Rothblum, G.N.2
-
25
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, pages 223-238, 1999.
-
(1999)
EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
26
-
-
84947912552
-
All-or-nothing encryption and the package transform
-
R. L. Rivest. All-or-nothing encryption and the package transform. In FSE, pages 210-218, 1997.
-
(1997)
FSE
, pp. 210-218
-
-
Rivest, R.L.1
-
27
-
-
58349118819
-
Compact proofs of retrievability
-
H. Shacham and B. Waters. Compact proofs of retrievability. In ASIACRYPT, pages 90-107, 2008.
-
(2008)
ASIACRYPT
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
28
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
29
-
-
84872103252
-
Iris: A scalable cloud file system with efficient integrity checks
-
E. Stefanov, M. van Dijk, A. Juels, and A. Oprea. Iris: a scalable cloud file system with efficient integrity checks. In ACSAC, pages 229-238, 2012.
-
(2012)
ACSAC
, pp. 229-238
-
-
Stefanov, E.1
Van Dijk, M.2
Juels, A.3
Oprea, A.4
-
31
-
-
0035754863
-
Tangler: A censorship-resistant publishing system based on document entanglements
-
M. Waldman and D. Mazières. Tangler: A censorship-resistant publishing system based on document entanglements. In ACM CCS, pages 126-135, 2001.
-
(2001)
ACM CCS
, pp. 126-135
-
-
Waldman, M.1
Mazières, D.2
-
32
-
-
0022882770
-
How to generate and exchange secrets (extended abstract)
-
A. C.-C. Yao. How to generate and exchange secrets (extended abstract). In FOCS, pages 162-167, 1986.
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.C.-C.1
|