Author:
Hsiao Jen-Ho,Tso Raylin,Chen Chien-Ming,Wu Mu-En
Reference6 articles.
1. Zyskind, G., et al.: Decentralizing privacy: using blockchain to protect personal data. In: Security and Privacy Workshops (SPW), pp. 180–184. IEEE (2015)
2. Kosba, A., et al.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: IEEE Symposium on Security and Privacy (SP), pp. 839–858. IEEE (2016)
3. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
4. Rabin, M.O: How to exchange secrets by oblivious transfer. Technical report, Aiken Computation Laboratory, Harvard University (1981)
5. Paillier, P: Public-key cryptosystems based on composite degree residuosity classes residues. In: Advances in Cryptology, Eurocrypt 1999, pp. 223–238 (1999)
Cited by
56 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献