Syntax-Driven Private Evaluation of Quantified Membership Queries
暂无分享,去创建一个
[1] Bart Goethals,et al. Advances in Frequent Itemset Mining Implementations: Introduction to FIMI03 , 2003, FIMI.
[2] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[3] David Chaum,et al. An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations , 1987, EUROCRYPT.
[4] Jan Camenisch,et al. Practical Verifiable Encryption and Decryption of Discrete Logarithms , 2003, CRYPTO.
[5] Ran Canetti,et al. Universally Composable Commitments , 2001, CRYPTO.
[6] Mihir Bellare,et al. On Defining Proofs of Knowledge , 1992, CRYPTO.
[7] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[8] Ivan Damgård,et al. Efficient Concurrent Zero-Knowledge in the Auxiliary String Model , 2000, EUROCRYPT.
[9] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[10] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[11] Taneli Mielikäinen,et al. Private Itemset Support Counting , 2005, ICICS.
[12] Ronald Cramer,et al. A secure and optimally efficient multi-authority election scheme , 1997, Eur. Trans. Telecommun..
[13] Ivan Damgård,et al. Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free? , 1998, CRYPTO.
[14] Giovanni Di Crescenzo,et al. On monotone formula closure of SZK , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[15] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[16] Peter Winkler,et al. Comparing information without leaking it , 1996, CACM.
[17] A. Yao. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[18] Pim Tuyls,et al. Practical Two-Party Computation Based on the Conditional Gate , 2004, ASIACRYPT.
[19] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[20] Aggelos Kiayias,et al. Testing Disjointness of Private Datasets , 2005, Financial Cryptography.
[21] Dawn Xiaodong Song,et al. Privacy-Preserving Set Operations , 2005, CRYPTO.
[22] Ivan Damgård,et al. Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor , 2001, CRYPTO.