Hong, Jeongdae; Kim, Jung Woo; Kim, Jihye; Park, Kunsoo; Cheon, Jung Hee Constant-round privacy preserving multiset union. (English) Zbl 1310.94152 Bull. Korean Math. Soc. 50, No. 6, 1799-1816 (2013). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Hong} et al., Bull. Korean Math. Soc. 50, No. 6, 1799--1816 (2013; Zbl 1310.94152) Full Text: DOI Link
Hong, Jeongdae; Kim, Jinil; Kim, Jihye; Franklin, Matthew K.; Park, Kunsoo Fair threshold decryption with semi-trusted third parties. (English) Zbl 1208.94046 Int. J. Appl. Cryptogr. 2, No. 2, 139-153 (2010). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Hong} et al., Int. J. Appl. Cryptogr. 2, No. 2, 139--153 (2010; Zbl 1208.94046) Full Text: DOI
Hong, Jeongdae; Kim, Jinil; Kim, Jihye; Franklin, Matthew K.; Park, Kunsoo Fair threshold decryption with semi-trusted third parties. (English) Zbl 1284.94081 Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 309-326 (2009). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Hong} et al., Lect. Notes Comput. Sci. 5594, 309--326 (2009; Zbl 1284.94081) Full Text: DOI