Paillier cryptosystem

Results: 121



#Item
11Cryptography / Public-key cryptography / Paillier cryptosystem / Homomorphic encryption / Ciphertext indistinguishability / Encryption / Malleability / Mental poker

Sorting and Searching Behind the Curtain Foteini Baldimtsi1 and Olga Ohrimenko2 1 Boston University, USA and University of Athens, Greece {} 2

Add to Reading List

Source URL: fc15.ifca.ai

Language: English - Date: 2015-01-11 00:33:27
12

A Practical Public Key Cryptosystem from Paillier and Rabin Schemes David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/

Add to Reading List

Source URL: www.dgalindo.es

Language: English - Date: 2007-11-26 10:36:18
    13Cryptography / Ciphertext indistinguishability / Paillier cryptosystem / Probabilistic encryption / CramerShoup cryptosystem / ElGamal encryption / Chosen-ciphertext attack / Cryptosystem / Advantage / Trapdoor function / Feistel cipher / RSA

    Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

    Add to Reading List

    Source URL: www.dgalindo.es

    Language: English - Date: 2007-11-26 10:35:45
    14Search algorithms / K-nearest neighbors algorithm / Cryptography / K-d tree / Paillier cryptosystem / Public-key cryptography / Recommender system / Privacy / Encryption

    Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li† † Richard Shin†

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2015-10-01 22:05:30
    15Homomorphic encryption / Secure multi-party computation / Semantic security / Distributed key generation / Threshold cryptosystem / RSA / Ciphertext indistinguishability / Commitment scheme / XTR / Cryptography / Public-key cryptography / Paillier cryptosystem

    An extended abstract of this paper was published in the proceedings of CT-RSAEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay∗

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2014-02-21 12:47:44
    16Computational complexity theory / Secure multi-party computation / Commitment scheme / Homomorphic encryption / Secure two-party computation / Paillier cryptosystem / Oblivious transfer / Zero-knowledge proof / Communication complexity / Cryptography / Cryptographic protocols / Public-key cryptography

    Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† November 25, 2010

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2010-11-25 08:58:28
    17Public-key cryptography / Categorical data / Electronic commerce / Logistic regression / XTR / Linear regression / RSA / Paillier cryptosystem / Mental poker / Statistics / Regression analysis / Econometrics

    2015 IEEE CS Security and Privacy Workshops Privacy-Preserving Statistical Analysis by Exact Logistic Regression David A. duVerle∗† , Shohei Kawasaki‡ , Yoshiji Yamada§ , Jun Sakuma‡¶ and Koji Tsuda∗

    Add to Reading List

    Source URL: www.genopri.org

    Language: English - Date: 2015-05-21 15:25:23
    18Homomorphic encryption / Internet privacy / Privacy / Cloud computing / Paillier cryptosystem / Secure multi-party computation / Software agent / Information privacy / Email / Cryptography / Public-key cryptography / Cryptographic protocols

    A Privacy-Preserving Cloud Computing System for Creating Participatory Noise Maps

    Add to Reading List

    Source URL: www.spice-center.org

    Language: English - Date: 2012-12-19 05:32:22
    19Public-key cryptography / Computer arithmetic / Electronic commerce / RSA / Paillier cryptosystem / Modular exponentiation / Exponentiation by squaring / Chinese remainder theorem / Montgomery reduction / Cryptography / Mathematics / Modular arithmetic

    A Method for Preventing "Skipping" Attacks

    Add to Reading List

    Source URL: ieee-security.org

    Language: English - Date: 2012-06-05 18:18:05
    20Security / Paillier cryptosystem / Merkle–Hellman knapsack cryptosystem / Niederreiter cryptosystem / Cryptography / Post-quantum cryptography / Cryptosystem / RSA / Semantic security / Public-key cryptography / Cyberwarfare / Applied mathematics

    Noname manuscript No. (will be inserted by the editor) Generalizing Cryptosystems Based on the Subset Sum Problem Aniket Kate · Ian Goldberg

    Add to Reading List

    Source URL: www.cypherpunks.ca

    Language: English - Date: 2011-05-05 15:39:42
    UPDATE