共 50 条
- [2] Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 18 - 35
- [3] Non-Interactive Secure Computation Based on Cut-and-Choose [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 387 - 404
- [4] Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer [J]. Journal of Cryptology, 2012, 25 : 680 - 722
- [5] Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer [J]. THEORY OF CRYPTOGRAPHY, 2011, 6597 : 329 - 346
- [6] Efficient Three-Party Computation from Cut-and-Choose [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 513 - 530
- [7] Secure Multi-Party Computation [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
- [9] Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 476 - 494
- [10] Heterogeneous Secure Multi-Party Computation [J]. NETWORKING 2012, PT II, 2012, 7290 : 198 - 210