A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation
暂无分享,去创建一个
[1] Miklós Ajtai,et al. Oblivious RAMs without cryptogrpahic assumptions , 2010, STOC '10.
[2] Ulrich Meyer,et al. Cache-Oblivious Data Structures and Algorithms for Undirected Breadth-First Search and Shortest Paths , 2004, SWAT.
[3] Kazuo Ohta,et al. Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol , 2007, Public Key Cryptography.
[4] Ivan Damgård,et al. Multiparty Computation from Threshold Homomorphic Encryption , 2000, EUROCRYPT.
[5] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[6] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[7] Mihir Bellare,et al. Incremental Cryptography: The Case of Hashing and Signing , 1994, CRYPTO.
[8] Tomas Toft,et al. Secure Equality and Greater-Than Tests with Sublinear Online Complexity , 2013, ICALP.
[9] Yvo Desmedt,et al. Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.
[10] Moni Naor,et al. Anti-persistence: history independent data structures , 2001, STOC '01.
[11] Mihir Bellare,et al. Incremental cryptography and application to virus protection , 1995, STOC '95.
[12] Ran Canetti,et al. Advances in Cryptology – CRYPTO 2012 , 2012, Lecture Notes in Computer Science.
[13] Daniele Micciancio,et al. Oblivious data structures: applications to cryptography , 1997, STOC '97.
[14] Kenneth E. Batcher,et al. Sorting networks and their applications , 1968, AFIPS Spring Joint Computing Conference.
[15] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[16] Ivan Damgård,et al. Perfectly Secure Oblivious RAM Without Random Oracles , 2011, IACR Cryptol. ePrint Arch..
[17] Ivan Damgård,et al. Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption , 2003, CRYPTO.
[18] Benny Pinkas,et al. Oblivious RAM Revisited , 2010, CRYPTO.
[19] Rosario Gennaro,et al. Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings , 2011, Public Key Cryptography.
[20] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[21] Ivan Damgård,et al. Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[22] Robin Milner,et al. On Observing Nondeterminism and Concurrency , 1980, ICALP.
[23] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[24] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[25] Tomas Toft. Sub-linear, Secure Comparison with Two Non-colluding Parties , 2011, Public Key Cryptography.
[26] Dan Boneh,et al. Advances in Cryptology - CRYPTO 2003 , 2003, Lecture Notes in Computer Science.
[27] Tal Rabin. Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings , 2010, CRYPTO.
[28] Adi Shamir,et al. How to share a secret , 1979, CACM.
[29] Torben Hagerup,et al. Algorithm Theory - SWAT 2004 , 2004, Lecture Notes in Computer Science.
[30] Rafail Ostrovsky,et al. On the (in)security of hash-based oblivious RAM and a new balancing scheme , 2012, SODA.
[31] Tatsuaki Okamoto,et al. Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings , 2007, Public Key Cryptography.
[32] Rafail Ostrovsky,et al. Distributed Oblivious RAM for Secure Two-Party Computation , 2013, TCC.
[33] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[34] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.