Paillier cryptosystem

Results: 121



#Item
31Secure multi-party computation / Homomorphic encryption / Paillier cryptosystem / Communications protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience? Martin Hirt1 , Jesper Buus Nielsen2 , and Bartosz Przydatek1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-06-03 06:46:06
32Finite fields / Computational complexity theory / Diffie–Hellman problem / ElGamal encryption / Universal hashing / Paillier cryptosystem / Diffie–Hellman key exchange / Cramer–Shoup cryptosystem / Index of cryptography articles / Cryptography / Cryptographic protocols / Public-key cryptography

A new security proof for Damg˚ ard’s ElGamal Kristian Gjøsteen March 17, 2005 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-17 15:37:01
33RSA / XTR / Three-pass protocol / Paillier cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

I. Introduction Programming Techniques S.L. Graham, R.L. Rivest* Editors

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-08-26 16:02:26
34Primality tests / Mathematics / Modular arithmetic / Computing / Finite fields / Electronic engineering / Public-key cryptography / Paillier cryptosystem / Accumulator

On the Impossibility of Batch Update for Cryptographic Accumulators Philippe Camacho Dept. of Computer Science, University of Chile, Blanco Encalada 2120, 3er piso, Santiago, Chile.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-15 20:16:12
35Cyberwarfare / Homomorphic encryption / Electronic commerce / Applied mathematics / Security / RSA / ANts P2P / Public-key cryptography / Cryptography / Paillier cryptosystem

Sorting and Searching Behind the Curtain Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data* Foteini Baldimtsi1 and Olga Ohrimenko2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-27 11:25:46
36Blind signature / Group signature / ElGamal encryption / RSA / Paillier cryptosystem / XTR / Diffie–Hellman problem / Homomorphic encryption / Commitment scheme / Cryptography / Public-key cryptography / Digital signature

Concurrent Blind Signatures without Random Oracles∗ Aggelos Kiayias† Hong-Sheng Zhou† Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-05-20 02:15:48
37Malleability / Ciphertext / Chosen-plaintext attack / RSA / Plaintext-aware encryption / Paillier cryptosystem / Cryptography / Ciphertext indistinguishability / Homomorphic encryption

Controlled Homomorphic Encryption: Definition and Construction Yvo Desmedt1 1 Vincenzo Iovino2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-06 07:23:00
38Homomorphic encryption / RSA / ElGamal encryption / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Electronic commerce

A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates Pei-yih Ting and Po-Yueh Hung Department of Computer Science, National Taiwan Ocean University {pyting, m92570002}@mail.ntou.edu.tw

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-04 01:29:08
39Security / Cyberwarfare / Cipher / Boolean circuit / Verifiable computing / Paillier cryptosystem / Cryptography / Homomorphic encryption / Applied mathematics

HEtest: A Homomorphic Encryption Testing Framework Mayank Varia1 , Sophia Yakoubov1 , and Yang Yang2,? 1 MIT Lincoln Laboratory?? , {mayank.varia, sophia.yakoubov}@ll.mit.edu 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-02 17:15:17
40Cryptanalysis / One-way function / Key / RSA / Password / Cryptographic protocol / Cryptosystem / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / One-time pad

New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman Abstract Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2001-12-26 10:46:32
UPDATE