Privacy preserving keyword searches on remote encrypted data

YC Chang, M Mitzenmacher - International conference on applied …, 2005 - Springer
We consider the following problem: a user U wants to store his files in an encrypted form on
a remote file server S. Later the user U wants to efficiently retrieve some of the encrypted …

Comprehensive survey on privacy-preserving protocols for sealed-bid auctions

R Alvarez, M Nojoumian - Computers & Security, 2020 - Elsevier
The internet is a ubiquitous technology that has changed conventional human interactions.
In our present time, it is not unusual for financial transactions to take place virtually with …

A survey on zero knowledge range proofs and applications

E Morais, T Koens, C Van Wijk, A Koren - SN Applied Sciences, 2019 - Springer
In last years, there has been an increasing effort to leverage distributed ledger technology
(DLT), including blockchain. One of the main topics of interest, given its importance, is the …

On private scalar product computation for privacy-preserving data mining

B Goethals, S Laur, H Lipmaa, T Mielikäinen - Information Security and …, 2005 - Springer
In mining and integrating data from multiple sources, there are many privacy and security
issues. In several different contexts, the security of the full privacy-preserving data mining …

An oblivious transfer protocol with log-squared communication

H Lipmaa - Information Security: 8th International Conference, ISC …, 2005 - Springer
We propose a one-round 1-out-of-n computationally-private information retrieval protocol for
ℓ-bit strings with low-degree polylogarithmic receiver-computation, linear sender …

An efficient solution to the millionaires' problem based on homomorphic encryption

HY Lin, WG Tzeng - Applied Cryptography and Network Security: Third …, 2005 - Springer
We proposed a two-round protocol for solving the Millionaires' Problem in the setting of semi-
honest parties. Our protocol uses either multiplicative or additive homomorphic encryptions …

A generalization of Paillier's public-key system with applications to electronic voting

I Damgård, M Jurik, JB Nielsen - International Journal of Information …, 2010 - Springer
We propose a generalization of Paillier's probabilistic public-key system, in which the
expansion factor is reduced and which allows to adjust the block length of the scheme even …

Redesigning bitcoin's fee market

R Lavi, O Sattath, A Zohar - ACM Transactions on Economics and …, 2022 - dl.acm.org
The Bitcoin payment system involves two agent types: users that transact with the currency
and pay fees and miners in charge of authorizing transactions and securing the system in …

Identity-based chameleon hash and applications

G Ateniese, B De Medeiros - … : 8th International Conference, FC 2004, Key …, 2004 - Springer
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm,
and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon …

Group signatures from lattices: simpler, tighter, shorter, ring-based

S Ling, K Nguyen, H Wang - IACR International Workshop on Public Key …, 2015 - Springer
We introduce a lattice-based group signature scheme that provides several noticeable
improvements over the contemporary ones: simpler construction, weaker hardness …