Privacy-enhancing machine learning framework with private aggregation of teacher ensembles | 0 | 0.34 | 2022 |
Distributed Fog Computing and Federated-Learning-Enabled Secure Aggregation for IoT Devices | 0 | 0.34 | 2022 |
Postquantum Cut-And-Choose Oblivious Transfer Protocol Based On Lwe | 0 | 0.34 | 2021 |
Quantum Secure Multi-Party Summation Based On Entanglement Swapping | 1 | 0.37 | 2021 |
Lightweight Threshold Private Set Intersection via Oblivious Transfer | 0 | 0.34 | 2021 |
An Efficient Outsourced Oblivious Transfer Extension Protocol And Its Applications | 0 | 0.34 | 2020 |
Lattice-Based Linearly Homomorphic Signature Scheme over F 2 | 0 | 0.34 | 2020 |
Research on Key Exchange Protocol Based on LWE | 0 | 0.34 | 2019 |
Decentralization is Vulnerable Under the Gap Game | 1 | 0.63 | 2019 |
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications | 0 | 0.34 | 2019 |
Privacy preserved wireless sensor location protocols based on mobile edge computing | 1 | 0.36 | 2019 |
ID-Based Strong Designated Verifier Signature over -SIS Assumption | 0 | 0.34 | 2019 |
Keyword guessing on multi-user searchable encryption | 0 | 0.34 | 2019 |
New Empirical Traceability Analysis of CryptoNote-Style Blockchains. | 1 | 0.35 | 2019 |
Efficient and secure outsourced approximate pattern matching protocol. | 0 | 0.34 | 2018 |
Position based cryptography with location privacy: A step for Fog Computing. | 0 | 0.34 | 2018 |
Towards leakage-resilient fine-grained access control in fog computing. | 7 | 0.42 | 2018 |
A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity. | 0 | 0.34 | 2018 |
Analysis on the Block Reward of Fork After Withholding (FAW). | 0 | 0.34 | 2018 |
Unforgeable Watermarking Schemes with Public Extraction. | 0 | 0.34 | 2018 |
An ORAM-based privacy preserving data sharing scheme for cloud storage. | 1 | 0.35 | 2018 |
Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption. | 0 | 0.34 | 2018 |
Towards Security Authentication for IoT Devices with Lattice-Based ZK. | 0 | 0.34 | 2018 |
Decentralized Blacklistable Anonymous Credentials with Reputation. | 0 | 0.34 | 2018 |
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency | 5 | 0.40 | 2018 |
Lattice-Based Universal Accumulator With Nonmembership Arguments | 0 | 0.34 | 2018 |
A New Post-Quantum Blind Signature From Lattice Assumptions. | 0 | 0.34 | 2018 |
Multi-user searchable encryption with a designated server. | 1 | 0.36 | 2017 |
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR. | 0 | 0.34 | 2017 |
An Efficient CPA-Secure Encryption Scheme with Equality Test | 0 | 0.34 | 2017 |
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application. | 0 | 0.34 | 2017 |
k-out-of-n oblivious transfer protocol with security against malicious adversaries. | 0 | 0.34 | 2017 |
Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System. | 0 | 0.34 | 2016 |
Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks | 3 | 0.42 | 2016 |
Practical Server-Aided K-Out-Of-N Oblivious Transfer Protocol | 0 | 0.34 | 2016 |
Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries | 0 | 0.34 | 2016 |
Leakage-Resilient Functional Encryption via Pair Encodings. | 4 | 0.37 | 2016 |
Improved Power Analysis Attack Based On The Preprocessed Power Traces | 0 | 0.34 | 2016 |
Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries | 0 | 0.34 | 2016 |
A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol | 0 | 0.34 | 2016 |
Public-key encryption with keyword search secure against continual memory attacks | 1 | 0.35 | 2016 |
Social rational secure multi-party computation | 8 | 0.46 | 2016 |
File sharing in cloud computing using win stay lose shift strategy | 1 | 0.35 | 2015 |
Performance evaluation of twisted Edwards‐form elliptic curve cryptography for wireless sensor nodes | 0 | 0.34 | 2015 |
The Electronic Voting in the Presence of Rational Voters | 0 | 0.34 | 2015 |
Several Oblivious Transfer Variants in Cut-and-Choose Scenario. | 0 | 0.34 | 2015 |
Weak Leakage Resilient Extractable Hash Proof System And Construction For Weak Leakage Resilient Cca-Secure Public-Key Encryption | 0 | 0.34 | 2015 |
Cut-and-Choose Bilateral Oblivious Transfer and Its Application | 2 | 0.40 | 2015 |
Achieving fairness by sequential equilibrium in rational two‐party computation under incomplete information | 0 | 0.34 | 2015 |
Cut-and-Choose Bilateral Oblivious Transfer and Its Application | 0 | 0.34 | 2015 |