共 50 条
- [31] A New Efficient Secure Multi-party Computation [J]. EMERGING SYSTEMS FOR MATERIALS, MECHANICS AND MANUFACTURING, 2012, 109 : 626 - 630
- [32] FairplayMP - A System for Secure Multi-Party Computation [J]. CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 257 - 266
- [33] Secure multi-party computation made simple [J]. SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 14 - 28
- [34] Wiretap Codes for Secure Multi-Party Computation [J]. 2014 GLOBECOM WORKSHOPS (GC WKSHPS), 2014, : 1349 - 1354
- [35] Secure Multi-Party Computation with Identifiable Abort [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 369 - 386
- [36] Secure multi-party computation in large networks [J]. DISTRIBUTED COMPUTING, 2017, 30 (03) : 193 - 229
- [37] Realistic Failures in Secure Multi-party Computation [J]. THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 274 - 293
- [38] Social rational secure multi-party computation [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1067 - 1083
- [39] A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain [J]. Li, Zhibin (lizb@cs.ecnu.edu.cn); Qi, Jiayin (ai@suibe.edu.cn), 2021, Science Press (58): : 281 - 290
- [40] Multi-party computation with conversion of secret sharing [J]. Designs, Codes and Cryptography, 2012, 62 : 259 - 272