Multiparty Proximity Testing with Dishonest Majority from Equality Testing
暂无分享,去创建一个
[1] Jonathan Katz,et al. Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation , 2000, FSE.
[2] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[3] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[4] Ian Goldberg,et al. Louis, Lester and Pierre: Three Protocols for Location Privacy , 2007, Privacy Enhancing Technologies.
[5] Jacques Traoré,et al. A fair and efficient solution to the socialist millionaires' problem , 2001, Discret. Appl. Math..
[6] Axel Küpper. Location-based Services: Fundamentals and Operation , 2005 .
[7] Ove Andersen,et al. A Location Privacy Aware Friend Locator , 2009, SSTD.
[8] Kyriakos Mouratidis,et al. Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.
[9] Rafail Ostrovsky,et al. Efficient and secure authenticated key exchange using weak passwords , 2009, JACM.
[10] Yehuda Lindell,et al. Universally Composable Password-Based Key Exchange , 2005, EUROCRYPT.
[11] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[12] Yehuda Lindell,et al. Efficient Secure Two-Party Protocols: Techniques and Constructions , 2010 .
[13] Rafail Ostrovsky,et al. On Complete Primitives for Fairness , 2010, TCC.
[14] Dan Boneh,et al. The Decision Diffie-Hellman Problem , 1998, ANTS.
[15] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[16] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[17] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[18] Rafael Tonicelli,et al. Universally Composable Private Proximity Testing , 2011, ProvSec.
[19] F. Bullo. 1. Preliminaries , 1988, Morse Index of Solutions of Nonlinear Elliptic Equations.
[20] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[21] I. Damglurd. Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation , 2006 .
[22] Eike Kiltz,et al. Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation , 2006, IACR Cryptol. ePrint Arch..
[23] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[24] David Pointcheval,et al. Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework , 2008, CT-RSA.
[25] Dan Boneh,et al. Location Privacy via Private Proximity Testing , 2011, NDSS.
[26] Helger Lipmaa,et al. Verifiable Homomorphic Oblivious Transfer and Private Equality Test , 2003, ASIACRYPT.
[27] I. Damgård,et al. The protocols. , 1989, The New Zealand nursing journal. Kai tiaki.
[28] William G. Griswold,et al. Peopletones: a system for the detection and notification of buddy proximity on mobile phones , 2008, MobiSys '08.
[29] Jerome H. Saltzer,et al. Protecting Poorly Chosen Secrets from Guessing Attacks , 1993, IEEE J. Sel. Areas Commun..
[30] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[31] Peter Winkler,et al. Comparing information without leaking it , 1996, CACM.
[32] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[33] Ivan Damgård,et al. Efficient Concurrent Zero-Knowledge in the Auxiliary String Model , 2000, EUROCRYPT.
[34] Marc Fischlin,et al. Trapdoor commitment schemes and their applications , 2001 .
[35] Rafail Ostrovsky,et al. Identifying Cheaters without an Honest Majority , 2012, TCC.
[36] Yehuda Lindell,et al. Session-Key Generation Using Human Passwords Only , 2001, Journal of Cryptology.
[37] Rafail Ostrovsky,et al. Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords , 2001, EUROCRYPT.
[38] PapadiasDimitris,et al. Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007 .
[39] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[40] Kazuo Ohta,et al. Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol , 2007, Public Key Cryptography.
[41] Marco Gruteser,et al. USENIX Association , 1992 .
[42] Wenfen Liu,et al. Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework , 2009, Inscrypt.
[43] Rafail Ostrovsky,et al. A Survey of Single-Database Private Information Retrieval: Techniques and Applications , 2007, Public Key Cryptography.
[44] Jonathan Katz,et al. Round-Optimal Password-Based Authenticated Key Exchange , 2011, TCC.