An efficient and probabilistic secure bit-decomposition
暂无分享,去创建一个
[1] Tomas Toft,et al. Constant-Rounds, Almost-Linear Bit-Decomposition of Secret Shared Values , 2009, CT-RSA.
[2] Tomas Toft,et al. Linear, Constant-Rounds Bit-Decomposition , 2009, ICISC.
[3] Marc Fischlin,et al. A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires , 2001, CT-RSA.
[4] Kazuo Ohta,et al. Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol , 2007, Public Key Cryptography.
[5] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[6] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[7] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[8] Pim Tuyls,et al. Efficient Binary Conversion for Paillier Encrypted Values , 2006, EUROCRYPT.
[9] Ian F. Blake,et al. One-round secure comparison of integers , 2009, J. Math. Cryptol..
[10] John Elder,et al. Handbook of Statistical Analysis and Data Mining Applications , 2009 .
[11] I. Damglurd. Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation , 2006 .
[12] Ivan Damgård,et al. Multiparty Computation from Threshold Homomorphic Encryption , 2000, EUROCRYPT.
[13] Qiuliang Xu,et al. Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security , 2011, IACR Cryptol. ePrint Arch..
[14] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[15] Adi Shamir,et al. How to share a secret , 1979, CACM.
[16] Bart Mennink,et al. Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis , 2010, Financial Cryptography.
[17] Jan Camenisch,et al. Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products , 2002, CRYPTO.
[18] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[19] Chris Clifton,et al. Practical and Secure Integer Comparison and Interval Check , 2010, 2010 IEEE Second International Conference on Social Computing.