Accelerating Secure (2+1)-Party Computation by Insecure but Efficient Building Blocks | 0 | 0.34 | 2021 |
Efficient Privacy-Preserving Variable-Length Substring Match for Genome Sequence. | 0 | 0.34 | 2021 |
Constant-Round Client-Aided Two-Server Secure Comparison Protocol And Its Applications | 0 | 0.34 | 2020 |
Simple Black-Box Adversarial Examples Generation with Very Few Queries. | 0 | 0.34 | 2020 |
Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application. | 0 | 0.34 | 2020 |
Simple Black-Box Adversarial Examples Generation With Very Few Queries | 0 | 0.34 | 2020 |
Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications. | 0 | 0.34 | 2020 |
Arbitrary Univariate Function Evaluation and Re-Encryption Protocols over Lifted-ElGamal Type Ciphertexts. | 0 | 0.34 | 2019 |
Accuracy/Efficiency Trade-Off for Privacy-Preserving Division Protocol | 0 | 0.34 | 2018 |
Tree-based Secure Comparison of Secret Shared Data | 0 | 0.34 | 2018 |
Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests | 0 | 0.34 | 2018 |
Provably Secure Password Reset Protocol: Model, Definition, and Generic Construction. | 0 | 0.34 | 2016 |
Proxy re-encryption via indistinguishability obfuscation. | 0 | 0.34 | 2016 |
Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption. | 7 | 0.44 | 2015 |
More Constructions Of Re-Splittable Threshold Public Key Encryption | 1 | 0.35 | 2014 |