Evaluating 2-DNF Formulas on Ciphertexts
- 1 January 2005
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 21 references indexed in Scilit:
- Efficient Private Matching and Set IntersectionLecture Notes in Computer Science, 2004
- Identity-Based Encryption from the Weil PairingSIAM Journal on Computing, 2003
- Applications of multilinear forms to cryptographyContemporary Mathematics, 2003
- A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key SystemLecture Notes in Computer Science, 2001
- One-Round Secure Computation and Secure Autonomous Mobile AgentsLecture Notes in Computer Science, 2000
- Fast batch verification for modular exponentiation and digital signaturesPublished by Springer Science and Business Media LLC ,1998
- A secure and optimally efficient multi‐authority election schemeEuropean Transactions on Telecommunications, 1997
- Multi-Authority Secret-Ballot Elections with Linear WorkLecture Notes in Computer Science, 1996
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- A robust and verifiable cryptographically secure election schemePublished by Institute of Electrical and Electronics Engineers (IEEE) ,1985