Secure Authenticated Comparisons
From MaRDI portal
Publication:3011317
DOI10.1007/978-3-642-21554-4_30zbMath1311.94105MaRDI QIDQ3011317
Hao Yuan, Keith B. Frikken, Mikhail J. Atallah
Publication date: 28 June 2011
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-21554-4_30
94A62: Authentication, digital signatures and secret sharing
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Authenticated hash tables based on cryptographic accumulators
- Planar graphs and poset dimension
- The random oracle methodology, revisited
- Labelling and Implicit Routing in Networks
- Fast Algorithms for Finding Nearest Common Ancestors
- Non-interactive Zero-Knowledge Arguments for Voting
- Efficient Protocols for Set Membership and Range Proofs
- The Complexity of the Partial Order Dimension Problem
- A unifying look at data structures
- Implicat Representation of Graphs
- A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Non-interactive Range Proof
- Super-Efficient Verification of Dynamic Outsourced Databases
- Advances in Cryptology - ASIACRYPT 2003