共 50 条
- [3] Multi-party computation with conversion of secret sharing Designs, Codes and Cryptography, 2012, 62 : 259 - 272
- [5] On codes, matroids and secure multi-party computation from linear secret sharing schemes ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 327 - 343
- [7] Multi-party computation enables secure polynomial control based solely on secret-sharing 2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 4882 - 4887
- [8] General secure multi-party computation from any linear secret-sharing scheme ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 316 - 334
- [9] A trusted IoT data sharing method based on secure multi-party computation JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
- [10] Improved Building Blocks for Secure Multi-party Computation Based on Secret Sharing with Honest Majority APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 377 - 397