Outsourced Pattern Matching
暂无分享,去创建一个
[1] Mario Di Raimondo,et al. Zero-Knowledge Sets With Short Proofs , 2008, IEEE Transactions on Information Theory.
[2] Damien Stehlé,et al. LLL on the Average , 2006, ANTS.
[3] Vinod Vaikuntanathan,et al. Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE , 2012, EUROCRYPT.
[4] Peeter Laud,et al. Eliminating Counterevidence with Applications to Accountable Certificate Management , 2002, J. Comput. Secur..
[5] Ninghui Li,et al. Universal Accumulators with Efficient Nonmembership Proofs , 2007, ACNS.
[6] Brent Waters,et al. A Framework for Efficient and Composable Oblivious Transfer , 2008, CRYPTO.
[7] Ben Riva,et al. Salus: a system for server-aided secure function evaluation , 2012, CCS.
[8] Helger Lipmaa,et al. On Diophantine Complexity and Statistical Zero-Knowledge Arguments , 2003, ASIACRYPT.
[9] Gil Segev,et al. Public-Key Cryptographic Primitives Provably as Secure as Subset Sum , 2010, TCC.
[10] Leonid A. Levin,et al. Fair Computation of General Functions in Presence of Immoral Majority , 1990, CRYPTO.
[11] Dario Fiore,et al. Vector Commitments and Their Applications , 2013, Public Key Cryptography.
[12] Tal Malkin,et al. Mercurial Commitments with Applications to Zero-Knowledge Sets , 2005, EUROCRYPT.
[13] Payman Mohassel,et al. Rate-Limited Secure Function Evaluation: Definitions and Constructions , 2013, Public Key Cryptography.
[14] Nicolas Gama,et al. Predicting Lattice Reduction , 2008, EUROCRYPT.
[15] Ivan Damgård,et al. A generalization of Paillier’s public-key system with applications to electronic voting , 2010, International Journal of Information Security.
[16] Alan M. Frieze,et al. On the Lagarias-Odlyzko Algorithm for the Subset Sum Problem , 1986, SIAM J. Comput..
[17] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[18] Roberto Tamassia,et al. Optimal Verification of Operations on Dynamic Sets , 2011, CRYPTO.
[19] Ivan Damgård,et al. A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order , 2002, ASIACRYPT.
[20] Ivan Damgård,et al. Secure Two-Party Computation with Low Communication , 2012, IACR Cryptol. ePrint Arch..
[21] Claus-Peter Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1990, EUROCRYPT.
[22] Yael Tauman Kalai,et al. Improved Delegation of Computation using Fully Homomorphic Encryption , 2010, IACR Cryptol. ePrint Arch..
[23] Yevgeniy Vahlis,et al. Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..
[24] Ronald Cramer,et al. A Secure and Optimally Efficient Multi-Authority Election Scheme ( 1 ) , 2000 .
[25] Carmit Hazay,et al. Text Search Protocols with Simulation Based Security , 2010, Public Key Cryptography.
[26] Silvio Micali,et al. Zero-knowledge sets , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..
[27] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[28] Yuval Ishai,et al. From Secrecy to Soundness: Efficient Verification via Secure Computation , 2010, ICALP.
[29] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[30] Marcos A. Kiwi,et al. Strong accumulators from collision-resistant hashing , 2008, International Journal of Information Security.
[31] Melissa Chase,et al. Pattern Matching Encryption , 2014, IACR Cryptol. ePrint Arch..
[32] Zvi Galil,et al. Solving dense subset-sum problems by using analytical number theory , 1989, J. Complex..
[33] Zvi Galil,et al. An Almost Linear-Time Algorithm for the Dense Subset-Sum Problem , 1991, ICALP.
[34] Carmit Hazay,et al. Efficient Set Operations in the Presence of Malicious Adversaries , 2010, Journal of Cryptology.
[35] Carmit Hazay,et al. Computationally Secure Pattern Matching in the Presence of Malicious Adversaries , 2010, ASIACRYPT.
[36] Jonathan Katz,et al. Multi-Client Non-interactive Verifiable Computation , 2013, TCC.
[37] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[38] Jeffrey C. Lagarias,et al. Solving low density subset sum problems , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[39] Robert S. Boyer,et al. A fast string searching algorithm , 1977, CACM.
[40] Donald Beaver,et al. Foundations of Secure Interactive Computing , 1991, CRYPTO.
[41] Andrew Shallue,et al. An Improved Multi-set Algorithm for the Dense Subset Sum Problem , 2008, ANTS.
[42] Payman Mohassel,et al. Efficient and Secure Delegation of Linear Algebra , 2011, IACR Cryptol. ePrint Arch..
[43] Antoine Joux,et al. Improved low-density subset sum algorithms , 1992, computational complexity.
[44] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[45] Ivan Damgård,et al. Supporting Non-membership Proofs with Bilinear-map Accumulators , 2008, IACR Cryptol. ePrint Arch..
[46] Vinod Vaikuntanathan,et al. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption , 2012, STOC '12.
[47] Charalampos Papamanthou,et al. Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..
[48] Benny Pinkas,et al. Keyword Search and Oblivious Pseudorandom Functions , 2005, TCC.
[49] Moni Naor,et al. Number-theoretic constructions of efficient pseudo-random functions , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[50] Jonathan Katz,et al. Secure text processing with applications to private DNA matching , 2010, CCS '10.
[51] Yi Mu,et al. Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems , 2009, CT-RSA.
[52] Vadim Lyubashevsky,et al. The Parity Problem in the Presence of Noise, Decoding Random Linear Codes, and the Subset Sum Problem , 2005, APPROX-RANDOM.
[53] Mariana Raykova,et al. Outsourcing Multi-Party Computation , 2011, IACR Cryptol. ePrint Arch..
[54] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[55] Moni Naor,et al. Adaptively secure multi-party computation , 1996, STOC '96.
[56] Hugo Krawczyk,et al. Outsourced symmetric private information retrieval , 2013, IACR Cryptol. ePrint Arch..
[57] Vitaly Shmatikov,et al. Efficient Two-Party Secure Computation on Committed Inputs , 2007, EUROCRYPT.
[58] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[59] Abraham D. Flaxman,et al. Solving Medium-Density Subset Sum Problems in Expected Polynomial Time , 2005, STACS.
[60] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[61] Yehuda Lindell,et al. Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries , 2008, Journal of Cryptology.
[62] Silvio Micali,et al. Secure Computation (Abstract) , 1991, CRYPTO.
[63] Donald E. Knuth,et al. Fast Pattern Matching in Strings , 1977, SIAM J. Comput..
[64] Phong Q. Nguyen,et al. BKZ 2.0: Better Lattice Security Estimates , 2011, ASIACRYPT.
[65] Peeter Laud,et al. Accountable certificate management using undeniable attestations , 2000, CCS.
[66] Charalampos Papamanthou,et al. Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.
[67] Moni Naor,et al. Efficient cryptographic schemes provably as secure as subset sum , 2004, Journal of Cryptology.
[68] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[69] Rosario Gennaro,et al. Efficiently Verifiable Computation on Encrypted Data , 2014, CCS.
[70] Stefan Katzenbeisser,et al. Privacy preserving error resilient dna searching through oblivious automata , 2007, CCS '07.