Verifiable Homomorphic Oblivious Transfer and Private Equality Test
暂无分享,去创建一个
[1] Jeroen van de Graaf,et al. Committed Oblivious Transfer and Private Multi-Party Computation , 1995, CRYPTO.
[2] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[3] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[4] Joan Feigenbaum,et al. Advances in Cryptology-Crypto 91 , 1992 .
[5] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[6] Helger Lipmaa,et al. On Diophantine Complexity and Statistical Zero-Knowledge Arguments , 2003, ASIACRYPT.
[7] Ivan Damgård,et al. A Length-Flexible Threshold Cryptosystem with Applications , 2003, ACISP.
[8] Valtteri Niemi,et al. Secure Vickrey Auctions without Threshold Trust , 2002, Financial Cryptography.
[9] Jan Camenisch,et al. Optimistic Fair Secure Computation , 2000, CRYPTO.
[10] Kaisa Nyberg,et al. Advances in Cryptology — EUROCRYPT'98 , 1998 .
[11] Ivan Damgård,et al. Linear zero-knowledge—a note on efficient zero-knowledge proofs and arguments , 1997, STOC '97.
[12] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[13] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.
[14] Rosario Gennaro,et al. Paillier's cryptosystem revisited , 2001, CCS '01.
[15] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[16] Jacques Traoré,et al. A fair and efficient solution to the socialist millionaires' problem , 2001, Discret. Appl. Math..
[17] Jacques Stern,et al. A new public key cryptosystem based on higher residues , 1998, CCS '98.
[18] Peter Winkler,et al. Comparing information without leaking it , 1996, CACM.
[19] Mihir Bellare. Advances in Cryptology — CRYPTO 2000 , 2000, Lecture Notes in Computer Science.
[20] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[21] Chi Sung Laih,et al. Advances in Cryptology - ASIACRYPT 2003 , 2003 .
[22] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[23] Markus Jakobsson,et al. Cryptographic Randomized Response Techniques , 2003, Public Key Cryptography.
[24] Fabrice Boudot,et al. Efficient Proofs that a Committed Number Lies in an Interval , 2000, EUROCRYPT.
[25] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[26] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[27] Yuval Ishai,et al. Priced Oblivious Transfer: How to Sell Digital Goods , 2001, EUROCRYPT.
[28] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[29] Bart Preneel,et al. Advances in cryptology - EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 : proceedings , 2000 .
[30] Wen-Guey Tzeng,et al. Efficient 1-Out-n Oblivious Transfer Schemes , 2002, Public Key Cryptography.
[31] Taher El Gamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms , 1984, CRYPTO.
[32] Tatsuaki Okamoto,et al. A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.