Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Quadratic residuosity problem

Known as: Quadratic residuacity problem, Quadratic residuocity problem 
The quadratic residuosity problem in computational number theory is to decide, given integers and , whether is a quadratic residue modulo or not.Here… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
We study the feasibility of two-message protocols for secure two-party computation in the plain model, for functionalities that… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
2014
2014
In AsiaCrypti¾?2013, Qin and Liu proposed a new approach to CCA-security of Public-Key Encryption PKE in the presence of bounded… Expand
  • table 1
Highly Cited
2010
Highly Cited
2010
We present a general framework for constructing two-message oblivious transfer protocols using a modification of Cramer and Shoup… Expand
  • figure 1
Highly Cited
2009
Highly Cited
2009
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side… Expand
  • table 1
2005
2005
We introduce Fair Zero-Knowledge, a multi-verifier ZK system where every proof is guaranteed to be “zero-knowledge for all… Expand
2005
2005
  • Y. Kalai
  • EUROCRYPT
  • 2005
  • Corpus ID: 29968288
We present a general framework for constructing two-message oblivious transfer protocols using a modification of Cramer and Shoup… Expand
Highly Cited
2001
Highly Cited
2001
We present a novel public key cryptosystem in which the public key of a subscriber can be chosen to be a publicly known value… Expand
Highly Cited
2001
Highly Cited
2001
We formalize the notion of a cryptographic counter, which allows a group of participants to increment and decrement a… Expand
  • table 1
  • figure 1
Highly Cited
1997
Highly Cited
1997
We establish the following, quite unexpected, result: replication of data for the computational private information retrieval… Expand
Highly Cited
1987
Highly Cited
1987
Consider n parties having local inputs x 1,x 2,...,x n respectively. and wishing to compute the value f(x 1,...,x n). where f is… Expand