A Privacy Preserved Two-Party Equality Testing Protocol
暂无分享,去创建一个
[1] Chuankun Wu,et al. Co-operative Private Equality Test , 2005, Int. J. Netw. Secur..
[2] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[3] Yi-Ting Chiang,et al. Secrecy of Two-Party Secure Computation , 2005, DBSec.
[4] Chris Clifton,et al. Leveraging the "Multi" in secure multi-party computation , 2003, WPES '03.
[5] Wenliang Du,et al. A practical approach to solve Secure Multi-party Computation problems , 2002, NSPW '02.
[6] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[7] Reihaneh Safavi-Naini,et al. An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.
[8] Jacques Stern,et al. A new public key cryptosystem based on higher residues , 1998, CCS '98.
[9] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[10] Peter Winkler,et al. Comparing information without leaking it , 1996, CACM.
[11] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[12] Silvio Micali,et al. The All-or-Nothing Nature of Two-Party Secure Computation , 1999, CRYPTO.
[13] David Naccache,et al. Secure Delegation of Elliptic-Curve Pairing , 2010, IACR Cryptol. ePrint Arch..
[14] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .