Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Signal Processing
Reference19 articles.
1. [1] M. Abe and K. Suzuki, “M + 1-st price auction using homomorphic encryption,” Proc. Public Key Cryptography, Lecture Notes in Computer Science, vol.2274, pp.115-124, 2002.
2. [2] D. Boneh and M. Franklin, “Efficient Generation of Shared RSA keys,” Public Key Cryptography 1998, LNCS vol.1431, pp.1-13, 1998.
3. [3] D. Boneh, E.-J. Goh, and K. Nissim, “Evaluating 2-DNF formulas on ciphertexts,” Proc. Theory of Cryptography, Lecture Notes in Computer Science, vol.3378, pp.325-341, 2005.
4. [4] D.L. Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms,” Commun. ACM, vol.24, no.2, pp.84-90, 1981.
5. [5] M.K. Franklin and M.K. Reiter, “The design and implementation of a secure auction service,” IEEE Trans. Softw. Eng., vol.22, no.5, pp.302-312, 1996.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献