On equuality testing protocols and their security
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Kaoru Kurosawa,et al. Bit-Slice Auction Circuit , 2002, ESORICS.
[3] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[4] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[5] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[6] Oded Goldreich,et al. Zero-Knowledge twenty years after its invention , 2002, Electron. Colloquium Comput. Complex..
[7] J. Doug Tygar,et al. Electronic Auctions with Private Bids , 1998, USENIX Workshop on Electronic Commerce.
[8] Ivan Damgård,et al. Efficient Multiparty Computations Secure Against an Adaptive Adversary , 1999, EUROCRYPT.
[9] Jacques Traoré,et al. A fair and efficient solution to the socialist millionaires' problem , 2001, Discret. Appl. Math..
[10] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[11] Hiroaki Kikuchi,et al. Multi-round Anonymous Auction Protocols , 1999 .
[12] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[13] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[14] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[15] Hugo Krawczyk,et al. On the Composition of Zero-Knowledge Proof Systems , 1990, ICALP.
[16] Christian Cachin,et al. Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.
[17] Matthew K. Franklin,et al. The Design and Implementation of a Secure Auction Service , 1996, IEEE Trans. Software Eng..
[18] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[19] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[20] Moni Naor,et al. Adaptively secure multi-party computation , 1996, STOC '96.
[21] Arto Salomaa,et al. Public-Key Cryptography , 1996, Texts in Theoretical Computer Science. An EATCS Series.
[22] Christian Cachin,et al. Distributing trust on the Internet , 2001, 2001 International Conference on Dependable Systems and Networks.
[23] Adi Shamir,et al. How to share a secret , 1979, CACM.
[24] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[25] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[26] Tatsuaki Okamoto,et al. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.
[27] Markus Jakobsson,et al. Threshold Password-Authenticated Key Exchange , 2002, CRYPTO.
[28] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.
[29] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[30] Douglas Wikström,et al. The Security of a Mix-Center Based on a Semantically Secure Cryptosystem , 2002, INDOCRYPT.
[31] Markus Jakobsson,et al. Mix and Match: Secure Function Evaluation via Ciphertexts , 2000, ASIACRYPT.
[32] Stanislaw Jarecki. Efficient threshold cryptosystems , 2001 .
[33] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[34] Ari Juels,et al. A Two-Server, Sealed-Bid Auction Protocol , 2002, Financial Cryptography.
[35] Matthew K. Franklin,et al. Joint Encryption and Message-Efficient Secure Computation , 1993, CRYPTO.
[36] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[37] Moni Naor,et al. Timed Commitments , 2000, CRYPTO.
[38] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[39] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[40] Ran Canetti,et al. Asynchronous secure computation , 1993, STOC.
[41] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[42] Tal Rabin,et al. Secure distributed storage and retrieval , 1997, Theor. Comput. Sci..
[43] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[44] Masayuki Abe,et al. M+1-st Price Auction Using Homomorphic Encryption , 2002, Public Key Cryptography.
[45] Yvo Desmedt,et al. Society and Group Oriented Cryptography: A New Concept , 1987, CRYPTO.
[46] Hiroaki Kikuchi,et al. (M+1)st-Price Auction Protocol , 2002, Financial Cryptography.
[47] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[48] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[49] David Chaum,et al. Blinding for Unanticipated Signatures , 1987, EUROCRYPT.
[50] Moni Naor,et al. Non-malleable cryptography , 1991, STOC '91.