Secure Multi-party Computational Geometry
- 2 August 2001
- book chapter
- Published by Springer Nature
- p. 165-179
- https://doi.org/10.1007/3-540-44634-6_16
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Efficient private bidding and auctions with an oblivious third partyPublished by Association for Computing Machinery (ACM) ,1999
- Oblivious transfer and polynomial evaluationPublished by Association for Computing Machinery (ACM) ,1999
- Computationally Private Information Retrieval with Polylogarithmic CommunicationPublished by Springer Nature ,1999
- Public-Key Cryptosystems Based on Composite Degree Residuosity ClassesPublished by Springer Nature ,1999
- A new public key cryptosystem based on higher residuesPublished by Association for Computing Machinery (ACM) ,1998
- Comparing information without leaking itCommunications of the ACM, 1996
- How to play ANY mental gamePublished by Association for Computing Machinery (ACM) ,1987
- How to generate and exchange secretsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1986
- A randomized protocol for signing contractsCommunications of the ACM, 1985
- Protocols for secure computationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982