共 50 条
- [41] Secure Two-Party Computation over Unreliable Channels SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 445 - 463
- [42] A study of secure two-party circle computation problem Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2009, 32 (03): : 32 - 35
- [44] Rational Secure Two-party Computation in Social Cloud NETWORK AND SYSTEM SECURITY, 2014, 8792 : 476 - 483
- [45] Completeness in Two-Party Secure Computation: A Computational View Journal of Cryptology, 2006, 19 : 521 - 552
- [46] Efficiently Making Secure Two-Party Computation Fair FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 : 188 - 207
- [48] Round-optimal secure two-party computation ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 335 - 354
- [49] Privacy Preserving Two-Party Rational Set Computation Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (08): : 1397 - 1413
- [50] Outsourcing Secure Two-Party Computation as a Black Box CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 214 - 222