共 50 条
- [5] Secure Multiparty Computation of Approximations [J]. ACM TRANSACTIONS ON ALGORITHMS, 2006, 2 (03) : 435 - 472
- [6] Secure multiparty computation of DNF [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 254 - 268
- [7] Secure Multiparty Graph Computation [J]. 2016 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2016,
- [8] Scalable secure multiparty computation [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 501 - 520
- [9] Fairy Ring: Ubiquitous Secure Multiparty Computation Framework for Smartphone Applications [J]. PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 708 - 712
- [10] Two-Round Multiparty Secure Computation Minimizing Public Key Operations [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III, 2018, 10993 : 273 - 301