Publisher
Springer International Publishing
Reference27 articles.
1. Applebaum, B., Ishai, Y., Kushilevitz, E., Waters, B.: Encoding functions with constant online rate, or how to compress garbled circuit keys. SIAM J. Comput. 44(2), 433–466 (2015)
2. Benaloh, J.: Dense probabilistic encryption. In: Workshop on Selected Areas of Cryptography (1994)
3. Benhamouda, F., Herranz, J., Joye, M., Libert, B.: Efficient cryptosystems from $$2^k$$ -th power residue symbols. J. Cryptol. 30(2), 519–549 (2017)
4. Lecture Notes in Computer Science;IF Blake,2006
5. Lecture Notes in Computer Science;D Boneh,2005
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Private set intersection using RSA subgroups with constant-size encryptions;2023 20th Annual International Conference on Privacy, Security and Trust (PST);2023-08-21
2. A High Throughput BFV-Encryption-Based Secure Comparison Protocol;Mathematics;2023-03-02
3. Privacy-Preserving Closest Point Determination Based on Ciphertext Comparison;2022 IEEE International Performance, Computing, and Communications Conference (IPCCC);2022-11-11
4. Three-Party Integer Comparison and Applications;2021 IEEE International Performance, Computing, and Communications Conference (IPCCC);2021-10-29
5. Constant-round auction with insulated bidders;Science China Information Sciences;2021-05-24