Paillier's encryption: Implementation and cloud applications
暂无分享,去创建一个
[1] Cong Wang,et al. Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.
[2] Eric Wustrow,et al. Attacking the Washington, D.C. Internet Voting System , 2012, Financial Cryptography.
[3] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[4] Stefan Katzenbeisser,et al. Privacy-Preserving Matching of DNA Profiles , 2008, IACR Cryptol. ePrint Arch..
[5] Murat Kantarcioglu,et al. A Cryptographic Approach to Securely Share and Query Genomic Sequences , 2008, IEEE Transactions on Information Technology in Biomedicine.
[6] Mikhail J. Atallah,et al. Private and Cheating-Free Outsourcing of Algebraic Computations , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.
[7] Marina Blanton,et al. Secure and Efficient Protocols for Iris and Fingerprint Identification , 2011, ESORICS.
[8] Silvio Micali,et al. Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.
[9] Kazue Sako,et al. Efficient Receipt-Free Voting Based on Homomorphic Encryption , 2000, EUROCRYPT.
[10] Cong Wang,et al. Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations , 2011, 2011 31st International Conference on Distributed Computing Systems.
[11] Josh Benaloh,et al. Dense Probabilistic Encryption , 1999 .
[12] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[13] Mikhail J. Atallah,et al. Secure and Private Outsourcing of Shape-Based Feature Extraction , 2013, ICICS.
[14] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[15] Ben Adida,et al. Advances in cryptographic voting systems , 2006 .
[16] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[17] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.