Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
26
views
25
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,487
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Financial Cryptography and Data Security
Practical Fully Simulatable Oblivious Transfer with Sublinear Communication
other
Author(s):
Bingsheng Zhang
,
Helger Lipmaa
,
Cong Wang
,
Kui Ren
Publication date
(Print):
2013
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Scholarly Communication
Most cited references
25
Record
: found
Abstract
: not found
Book Chapter
: not found
Universally Composable Commitments
Ran Canetti
,
Marc Fischlin
(2001)
0
comments
Cited
76
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
On Defining Proofs of Knowledge
Mihir Bellare
,
Oded Goldreich
(1993)
0
comments
Cited
45
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Zero-Knowledge Undeniable Signatures (extended abstract)
David Chaum
(1991)
0
comments
Cited
33
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2013
Pages
: 78-95
DOI:
10.1007/978-3-642-39884-1_8
SO-VID:
3ac50e26-1ea8-4c7e-95b9-2b56dbae6f98
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Can Nature Help Us Solve Risk Management Issues?
pp. 6
Quantitative Analysis of the Full Bitcoin Transaction Graph
pp. 25
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk
pp. 34
Evaluating User Privacy in Bitcoin
pp. 52
The Importance of Being Earnest [In Security Warnings]
pp. 60
Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing
pp. 69
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication
pp. 78
Practical Fully Simulatable Oblivious Transfer with Sublinear Communication
pp. 96
Unconditionally-Secure Robust Secret Sharing with Minimum Share Size
pp. 111
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data
pp. 126
“Give Me Letters 2, 3 and 6!”: Partial Password Implementations and Attacks
pp. 144
Hey, You, Get Off of My Clipboard
pp. 162
Unique Ring Signatures: A Practical Construction
pp. 171
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency
pp. 189
Accumulators and U-Prove Revocation
pp. 197
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy
pp. 205
P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems
pp. 213
Coupon Collector’s Problem for Fault Analysis against AES — High Tolerance for Noisy Fault Injections
pp. 221
Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study
pp. 230
On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards
pp. 239
Securely Solving Simple Combinatorial Graph Problems
pp. 258
Parallel and Dynamic Searchable Symmetric Encryption
pp. 275
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits
pp. 293
The Untapped Potential of Trusted Execution Environments on Mobile Devices
pp. 295
Stark
pp. 313
Risks of Offline Verify PIN on Contactless Cards
pp. 322
How to Attack Two-Factor Authentication Internet Banking
pp. 329
CAge: Taming Certificate Authorities by Inferring Restricted Scopes
pp. 338
Interdependent Privacy: Let Me Share Your Data
pp. 354
A Secure Submission System for Online Whistleblowing Platforms
pp. 362
Securing Anonymous Communication Channels under the Selective DoS Attack
pp. 371
PIRMAP: Efficient Private Information Retrieval for MapReduce
pp. 386
Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates
pp. 395
Three-Factor User Authentication Method Using Biometrics Challenge Response
pp. 397
Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services
pp. 399
Onions for Sale: Putting Privacy on the Market
pp. 401
Searchable Encryption Supporting General Boolean Expression Queries
pp. 402
A Privacy Preserving E-Payment Architecture
pp. 403
Communication Services Empowered with a Classical Chaos Based Cryptosystem
Similar content
3,487
Fully Simulatable Quantum-Secure Coin-Flipping and Applications
Authors:
Carolin Lunemann
,
Jesper Buus Nielsen
Newtonian and special-relativistic predictions for the trajectory of a slow-moving dissipative dynamical system. Commun. Nonlinear Sci. Numer. Simulat.
Authors:
BL Lan
,
HY Cheng
Understanding mol. simulat
Authors:
D FRENKEL
See all similar
Cited by
2
Universally Composable Oblivious Transfer Based on a Variant of LPN
Authors:
Bernardo David
,
Rafael Dowsley
,
Anderson C. A. Nascimento
Symmetric Blind Decryption with Perfect Secrecy
Authors:
Juha Partala
See all cited by