共 50 条
- [2] Three-Party ORAM for Secure Computation [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 360 - 385
- [3] Secure three-party computational protocols for triangle area [J]. International Journal of Information Security, 2016, 15 : 1 - 13
- [6] On the Exact Round Complexity of Secure Three-Party Computation [J]. Journal of Cryptology, 2021, 34
- [7] On the Exact Round Complexity of Secure Three-Party Computation [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 425 - 458
- [8] Efficient and Malicious Secure Three-Party Private Set Intersection Computation Protocols for Small Sets [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (10): : 2286 - 2298
- [9] Fast and Secure Three-party Computation: The Garbled Circuit Approach [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 591 - 602
- [10] Information-Theoretically Secure Three-Party Computation with One Corrupted Party [J]. 2013 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2013, : 3160 - +