Strictly-Black-Box Zero-Knowledge and Efficient Validation of Financial Transactions
暂无分享,去创建一个
Moti Yung | Yishay Mansour | S. Muthukrishnan | Michael O. Rabin | Y. Mansour | M. Rabin | M. Yung | S. Muthukrishnan
[1] M. Rabin,et al. Randomized algorithms in number theory , 1985 .
[2] Ernest F. Brickell,et al. Gradual and Verifiable Release of a Secret , 1987, CRYPTO.
[3] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..
[4] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[5] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[6] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[7] Silvio Micali,et al. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.
[8] Joan Feigenbaum,et al. Advances in Cryptology-Crypto 91 , 1992 .
[9] Joe Kilian,et al. A note on efficient zero-knowledge proofs and arguments (extended abstract) , 1992, STOC '92.
[10] Ivan Damgård,et al. Linear zero-knowledge—a note on efficient zero-knowledge proofs and arguments , 1997, STOC '97.
[11] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[12] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[13] Carl Pomerance,et al. Advances in Cryptology — CRYPTO ’87 , 2000, Lecture Notes in Computer Science.
[14] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[15] Masayuki Abe,et al. M+1-st Price Auction Using Homomorphic Encryption , 2002, Public Key Cryptography.
[16] Valtteri Niemi,et al. Secure Vickrey Auctions without Threshold Trust , 2002, Financial Cryptography.
[17] Jan Camenisch,et al. Practical Verifiable Encryption and Decryption of Discrete Logarithms , 2003, CRYPTO.
[18] Dan Boneh,et al. Advances in Cryptology - CRYPTO 2003 , 2003, Lecture Notes in Computer Science.
[19] Mads J. Jurik,et al. Extensions to the Paillier Cryptosystem with Applications to Cryptological Protocols , 2003 .
[20] Jongin Lim,et al. Information Security and Cryptology - ICISC 2003 , 2003, Lecture Notes in Computer Science.
[21] Byoungcheon Lee,et al. Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption , 2003, ICISC.
[22] Emmanouil Magkos,et al. Uncoercible e-Bidding Games , 2004, Electron. Commer. Res..
[23] Felix Brandt,et al. How to obtain full privacy in auctions , 2006, International Journal of Information Security.
[24] David C. Parkes,et al. Practical secrecy-preserving, verifiably correct and trustworthy auctions , 2006, ICEC '06.
[25] Rocco A. Servedio,et al. Highly Efficient Secrecy-Preserving Proofs of Correctness of Computations and Applications , 2007, 22nd Annual IEEE Symposium on Logic in Computer Science (LICS 2007).
[26] David C. Parkes,et al. Cryptographic Combinatorial Securities Exchanges , 2009, Financial Cryptography.
[27] Ivan Damgård,et al. Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.
[28] Joseph Bonneau,et al. What's in a Name? , 2020, Financial Cryptography.