Practical Secure Evaluation of Semi-Private Functions
暂无分享,去创建一个
[1] Leslie G. Valiant,et al. Universal circuits (Preliminary Report) , 1976, STOC '76.
[2] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[3] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[4] Yuval Ishai,et al. Priced Oblivious Transfer: How to Sell Digital Goods , 2001, EUROCRYPT.
[5] Yehuda Lindell,et al. A Proof of Yao's Protocol for Secure Two-Party Computation , 2004, Electron. Colloquium Comput. Complex..
[6] Mikhail J. Atallah,et al. Hidden access control policies with hidden credentials , 2004, WPES '04.
[7] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!) , 2004 .
[8] Vladimir Kolesnikov. Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation , 2005, ASIACRYPT.
[9] John Langford,et al. Covert two-party computation , 2005, STOC '05.
[10] Mikhail J. Atallah,et al. Privacy-preserving credit checking , 2005, EC '05.
[11] Mikhail J. Atallah,et al. Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles , 2006, NDSS.
[12] Mikhail J. Atallah,et al. Attribute-Based Access Control with Hidden Policies and Hidden Credentials , 2006, IEEE Transactions on Computers.
[13] Sven Laur,et al. A New Protocol for Conditional Disclosure of Secrets and Its Applications , 2007, ACNS.
[14] Mauro Barni,et al. Oblivious Neural Network Computing via Homomorphic Encryption , 2007, EURASIP J. Inf. Secur..
[15] Vladimir Kolesnikov,et al. A Practical Universal Circuit Construction and Secure Evaluation of Private Functions , 2008, Financial Cryptography.
[16] Vladimir Kolesnikov,et al. Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.
[17] Ahmad-Reza Sadeghi,et al. Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification , 2009, IACR Cryptol. ePrint Arch..
[18] Mauro Barni,et al. Enhancing Privacy in Remote Data Classification , 2008, SEC.
[19] Yehuda Lindell,et al. Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries , 2008, SCN.
[20] Adam D. Smith,et al. Efficient Two Party and Multi Party Computation Against Covert Adversaries , 2008, EUROCRYPT.
[21] Yehuda Lindell,et al. Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries , 2007, Journal of Cryptology.