Pages that link to "Item:Q4250764"
From MaRDI portal
The following pages link to Public-Key Cryptosystems Based on Composite Degree Residuosity Classes (Q4250764):
Displaying 50 items.
- Efficient set intersection with simulation-based security (Q271588) (← links)
- Rate-limited secure function evaluation (Q329720) (← links)
- Paillier's trapdoor function hides \(\Theta(n)\) bits (Q350942) (← links)
- Privacy and verifiability in voting systems: methods, developments and trends (Q395657) (← links)
- Paillier-based publicly verifiable (non-interactive) secret sharing (Q398963) (← links)
- Smooth projective hashing and two-message oblivious transfer (Q421036) (← links)
- Discrete logarithm based additively homomorphic encryption and secure data aggregation (Q433021) (← links)
- Efficient set operations in the presence of malicious adversaries (Q434343) (← links)
- A new construction of the server-aided verification signature scheme (Q445370) (← links)
- Short undeniable signatures based on group homomorphisms (Q451120) (← links)
- Lossy trapdoor functions from homomorphic reproducible encryption (Q456129) (← links)
- An efficient IND-CCA2 secure Paillier-based cryptosystem (Q456166) (← links)
- A characterization of chameleon hash functions and new, efficient designs (Q484332) (← links)
- Secure multiparty computation of solid geometric problems and their applications (Q507770) (← links)
- Efficient one-sided adaptively secure computation (Q514477) (← links)
- Electronic jury voting protocols (Q596143) (← links)
- A verifiable secret shuffle of homomorphic encryptions (Q604630) (← links)
- Restricted adaptive oblivious transfer (Q650878) (← links)
- Resource fairness and composability of cryptographic protocols (Q656919) (← links)
- Trusted computing with addition machines. I (Q681716) (← links)
- Oblivious access control policies for cloud based data sharing systems (Q695037) (← links)
- A communication-efficient private matching scheme in client-server model (Q726566) (← links)
- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups (Q735025) (← links)
- Security and privacy aspects in MapReduce on clouds: a survey (Q739007) (← links)
- Better security for deterministic public-key encryption: the auxiliary-input setting (Q744600) (← links)
- Computationally secure pattern matching in the presence of malicious adversaries (Q744607) (← links)
- SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions (Q831176) (← links)
- Trapdoor DDH groups from pairings and isogenies (Q832364) (← links)
- Secret computation of purchase history data using somewhat homomorphic encryption (Q890595) (← links)
- A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle (Q897888) (← links)
- Spreading alerts quietly and the subgroup escape problem (Q901371) (← links)
- On RSA moduli with almost half of the bits prescribed (Q1003703) (← links)
- Semantic security for the McEliece cryptosystem without random oracles (Q1009060) (← links)
- Hybrid commitments and their applications to zero-knowledge proof systems (Q1022606) (← links)
- Filling the gap between voters and cryptography in e-voting (Q1028368) (← links)
- Distributed anonymous data perturbation method for privacy-preserving data mining (Q1045647) (← links)
- Some basics on privacy techniques, anonymization and their big data challenges (Q1616158) (← links)
- Information security protocol based system identification with binary-valued observations (Q1621182) (← links)
- Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model (Q1633458) (← links)
- Privacy-preserving distributed mining of association rules using elliptic-curve cryptosystem and Shamir's secret sharing scheme (Q1637704) (← links)
- Privacy-preserving inverse distance weighted interpolation (Q1639853) (← links)
- Regular lossy functions and their applications in leakage-resilient cryptography (Q1643156) (← links)
- Review of cryptographic schemes applied to remote electronic voting systems: remaining challenges and the upcoming post-quantum paradigm (Q1643980) (← links)
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems (Q1650427) (← links)
- Reproducible circularly secure bit encryption: applications and realizations (Q1698399) (← links)
- Privacy-preserving outsourcing of image feature extraction in cloud computing (Q1701922) (← links)
- Decentralized multi-client functional encryption for inner product (Q1710623) (← links)
- Practical fully secure unrestricted inner product functional encryption modulo \(p\) (Q1710625) (← links)
- Homomorphic secret sharing for low degree polynomials (Q1710675) (← links)
- Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption (Q1711842) (← links)