Evaluating Branching Programs on Encrypted Data
暂无分享,去创建一个
[1] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[2] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[3] Benny Pinkas,et al. Keyword Search and Oblivious Pseudorandom Functions , 2005, TCC.
[4] Yehuda Lindell,et al. A Proof of Yao's Protocol for Secure Two-Party Computation , 2004, Electron. Colloquium Comput. Complex..
[5] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[6] Oded Goldreich,et al. Universal arguments and their applications , 2002, Proceedings 17th IEEE Annual Conference on Computational Complexity.
[7] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[8] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[9] S. Micali,et al. Noninteractive Zero-Knowledge , 1990, SIAM J. Comput..
[10] Moni Naor,et al. A minimal model for secure computation (extended abstract) , 1994, STOC '94.
[11] Julien P. Stern. A new and efficient all-or-nothing disclosure of secrets protocol , 1998 .
[12] Silvio Micali,et al. Zero-knowledge sets , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..
[13] Moti Yung,et al. Non-interactive cryptocomputing for NC/sup 1/ , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[14] Yuval Ishai,et al. Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials , 2002, ICALP.
[15] Kazuo Ohta,et al. Advances in Cryptology — ASIACRYPT’98 , 2002, Lecture Notes in Computer Science.
[16] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[17] Julien P. Stern. A New Efficient All-Or-Nothing Disclosure of Secrets Protocol , 1998, ASIACRYPT.
[18] Victor Shoup. Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings , 2005, CRYPTO.
[19] Nicholas Pippenger,et al. On simultaneous resource bounds , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).
[20] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[21] Helger Lipmaa,et al. An Oblivious Transfer Protocol with Log-Squared Communication , 2005, ISC.
[22] Vladimir Kolesnikov. Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation , 2005, ASIACRYPT.
[23] Moni Naor,et al. A Minimal Model for Secure Computation , 2002 .
[24] Moni Naor,et al. Communication preserving protocols for secure function evaluation , 2001, STOC '01.
[25] Joe Kilian,et al. One-Round Secure Computation and Secure Autonomous Mobile Agents , 2000, ICALP.
[26] Manuel Blum,et al. Noninteractive Zero-Knowledge , 1991, SIAM J. Comput..
[27] Yuval Ishai,et al. Randomizing polynomials: A new representation with applications to round-efficient secure computation , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[28] Donald Beaver. Minimal-Latency Secure Function Evaluation , 2000, EUROCRYPT.
[29] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[30] Moni Naor,et al. Distributed Oblivious Transfer , 2000, ASIACRYPT.
[31] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[32] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[33] Moni Naor,et al. Private Information Retrieval by Keywords , 1998, IACR Cryptol. ePrint Arch..
[34] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[35] Bart Preneel,et al. Topics in Cryptology — CT-RSA 2002 , 2002, Lecture Notes in Computer Science.
[36] A. Maximov,et al. Fast computation of large distributions and its cryptographic applications , 2005 .
[37] Rafail Ostrovsky,et al. Private Searching on Streaming Data , 2005, Journal of Cryptology.
[38] Yuval Ishai,et al. Priced Oblivious Transfer: How to Sell Digital Goods , 2001, EUROCRYPT.
[39] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[40] Robin Milner,et al. On Observing Nondeterminism and Concurrency , 1980, ICALP.
[41] Bart Preneel,et al. Advances in cryptology - EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 : proceedings , 2000 .
[42] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[43] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[44] Silvio Micali,et al. Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.
[45] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[46] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..