Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
33
views
30
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,204
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Provable Security : 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings
Homomorphic Secret Sharing from Paillier Encryption
other
Author(s):
Nelly Fazio
,
Rosario Gennaro
,
Tahereh Jafarikhah
,
William E. Skeith
Publication date
(Online):
October 17 2017
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
30
Record
: found
Abstract
: not found
Book Chapter
: not found
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Pascal Paillier
(1999)
0
comments
Cited
370
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
How to share a secret
Adi Shamir
(1979)
0
comments
Cited
330
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
How to generate and exchange secrets
Andrew Yao
(1986)
0
comments
Cited
309
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2017
Publication date (Online):
October 17 2017
Pages
: 381-399
DOI:
10.1007/978-3-319-68637-0_23
SO-VID:
3e25fb53-8da3-40a4-a0a7-fa773e87a27e
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 105
Model for Simultaneous Actions in Situated Multi-agent Systems
pp. 381
Homomorphic Secret Sharing from Paillier Encryption
pp. 419
A hardware design model for cryptographic algorithms
pp. 492
Discourse Particles and User Characteristics in Naturalistic Human-Computer Interaction
Similar content
2,204
A cryptograph domain image retrieval method based on Paillier Homomorphic block encryption
Authors:
Xu
,
W Xu
Paillier cryptography based message authentication code for IoMT security
Authors:
SS Devi
Comparison of the Paillier and ElGamal Cryptosystems for Smart Grid Aggregation Protocols
Authors:
Fabian Knirsch
,
Andreas Unterweger
,
Maximilian Unterrainer
…
See all similar
Cited by
2
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation
Authors:
Elette Boyle
,
Nishanth Chandran
,
Niv Gilboa
…
Breaking the Circuit Size Barrier for Secure Computation Under Quasi-Polynomial LPN
Authors:
Geoffroy Couteau
,
Pierre Meyer
See all cited by