共 50 条
- [31] Secure Two-Party Computation: A Visual Way INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 18 - 38
- [34] Secure Two-Party Computation Based on Blind Quantum Computation International Journal of Theoretical Physics, 2020, 59 : 2074 - 2082
- [35] Universally-composable two-party computation in two rounds ADVANCES IN CRYPTOLOGY - CRYPTO 2007, PROCEEDINGS, 2007, 4622 : 111 - 129
- [37] An efficient protocol for fair secure two-party computation TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 88 - 105
- [38] Practical two-party computation based on the conditional gate ADVANCES IN CRYPTOLOGY - ASIACRYPT 2004, PROCEEDINGS, 2004, 3329 : 119 - 136
- [39] Distributed Oblivious RAM for Secure Two-Party Computation THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 377 - 396
- [40] Information theoretical analysis of two-party secret computation DATA AND APPLICATIONS SECURITY XX, PROCEEDINGS, 2006, 4127 : 310 - 317