Efficiency Improvement of Homomorphic E-Auction
暂无分享,去创建一个
[1] Atsuko Miyaji,et al. A Second-price Sealed-bid Auction with the Discriminant of the p0-th Root , 2002, Financial Cryptography.
[2] Tatsuaki Okamoto,et al. Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings , 2007, Public Key Cryptography.
[3] Mihir Bellare,et al. Fast Batch Verification for Modular Exponentiation and Digital Signatures , 1998, IACR Cryptol. ePrint Arch..
[4] Moti Yung,et al. Advances in Cryptology — CRYPTO 2002 , 2002, Lecture Notes in Computer Science.
[5] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[6] Hiroaki Kikuchi,et al. (M+1)st-Price Auction Protocol , 2002, Financial Cryptography.
[7] Ed Dawson,et al. Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing , 2005, Mycrypt.
[8] 晋輝 趙,et al. H. Cohen, G. Frey, R. Avanzi, C. Doche, T. Lange, K. Nguyen and F. Vercauteren (eds.): Handbook of Elliptic and Hyperelliptic Curve Cryptography, Discrete Math. Appl. (Boca Raton)., Chapman & Hall/CRC, 2006年,xxxiv + 808ページ. , 2009 .
[9] Masayuki Abe,et al. 1-out-of-n Signatures from a Variety of Keys , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[10] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[11] Ed Dawson,et al. A Novel Range Test , 2006, ACISP.
[12] Ed Dawson,et al. Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction , 2002, ICICS.
[13] Kaisa Nyberg,et al. Advances in Cryptology — EUROCRYPT'98 , 1998 .
[14] Shohachiro Nakanishi,et al. Distributed auction servers resolving winner and winning bid without revealing privacy of bids , 2000, Proceedings Seventh International Conference on Parallel and Distributed Systems: Workshops.
[15] Ed Dawson,et al. Batch verification of validity of bids in homomorphic e-auction , 2006, Comput. Commun..
[16] Jens Groth,et al. Verifiable Shuffle of Large Size Ciphertexts , 2007, Public Key Cryptography.
[17] Jan Camenisch,et al. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials , 2002, CRYPTO.
[18] Yvo Desmedt,et al. Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.
[19] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[20] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[21] Koji Chida,et al. Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump Comparison , 2001, ISC.
[22] Ed Dawson,et al. A Range Test Secure in the Active Adversary Model , 2007, ACSW.
[23] Ed Dawson,et al. Correct, Private, Flexible and Efficient Range Test , 2008, J. Res. Pract. Inf. Technol..
[24] Kun Peng,et al. Practicalization of a Range Test and Its Application to E-Auction , 2009, EuroPKI.
[25] Josef Pieprzyk,et al. Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings , 2008, ASIACRYPT.
[26] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[27] Abhi Shelat,et al. Efficient Protocols for Set Membership and Range Proofs , 2008, ASIACRYPT.
[28] Tanja Lange,et al. Handbook of Elliptic and Hyperelliptic Curve Cryptography , 2005 .
[29] Shafi Goldwasser,et al. Advances in Cryptology — CRYPTO’ 88: Proceedings , 1990, Lecture Notes in Computer Science.
[30] Jacques Stern,et al. Sharing Decryption in the Context of Voting or Lotteries , 2000, Financial Cryptography.
[31] Felix Brandt,et al. Cryptographic Protocols for Secure Second-Price Auctions , 2001, CIA.
[32] Jean-Jacques Quisquater,et al. A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge , 1988, CRYPTO.
[33] Ed Dawson,et al. A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption , 2005, ISC.
[34] Yuliang Zheng,et al. Advances in Cryptology — ASIACRYPT 2002 , 2002, Lecture Notes in Computer Science.
[35] Aggelos Kiayias,et al. Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers , 2005, Mycrypt.
[36] Ed Dawson,et al. Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction , 2007, ISPEC.