Secure and Private Collaborative Linear Programming
暂无分享,去创建一个
[1] Mikhail J. Atallah,et al. Private collaborative forecasting and benchmarking , 2004, WPES '04.
[2] Ian T. Foster,et al. The Anatomy of the Grid: Enabling Scalable Virtual Organizations , 2001, Int. J. High Perform. Comput. Appl..
[3] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[4] Matthew K. Franklin,et al. Efficient generation of shared RSA keys , 2001, JACM.
[5] Niv Gilboa,et al. Two Party RSA Key Generation , 1999, CRYPTO.
[6] Wenliang Du,et al. Secure and private sequence comparisons , 2003, WPES '03.
[7] Ivan Damgård,et al. Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free? , 1998, CRYPTO.
[8] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[9] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[10] George B. Dantzig,et al. Linear Programming 1: Introduction , 1997 .
[11] Nimrod Megiddo,et al. A simplex algorithm whose average number of steps is bounded between two quadratic functions of the smaller dimension , 1985, JACM.
[12] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[13] V. Klee,et al. HOW GOOD IS THE SIMPLEX ALGORITHM , 1970 .
[14] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[15] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[16] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[17] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[18] Tatsuaki Okamoto,et al. EPOC: Efficient Probabilistic Public-Key Encryption (Submission to P1363a) , 1998 .
[19] Narendra Karmarkar,et al. A new polynomial-time algorithm for linear programming , 1984, Comb..
[20] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[21] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[22] Ivan Damgård,et al. Secure Distributed Linear Algebra in a Constant Number of Rounds , 2001, CRYPTO.
[23] Mikhail J. Atallah,et al. Privacy preserving route planning , 2004, WPES '04.
[24] Ivan Damgård,et al. A Length-Flexible Threshold Cryptosystem with Applications , 2003, ACISP.