共 21 条
- [2] Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation Journal of Cryptology, 2003, 16 : 143 - 184
- [3] Constant-round coin-tossing with a man in the middle or realizing the shared random string model FOCS 2002: 43RD ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2002, : 345 - 355
- [4] Constant-Round MPC with Fairness and Guarantee of Output Delivery ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 63 - 82
- [6] Constant-Round Client-Aided Secure Comparison Protocol COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 : 395 - 415
- [7] On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 2016, 9841 : 237 - 253
- [8] Perfect constant-round secure computation via perfect randomizing polynomials AUTOMATA, LANGUAGES AND PROGRAMMING, 2002, 2380 : 244 - 256
- [9] Constant-Round Maliciously Secure Two-Party Computation in the RAM Model Journal of Cryptology, 2019, 32 : 1144 - 1199
- [10] Constant-Round Maliciously Secure Two-Party Computation in the RAM Model THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 521 - 553