共 50 条
- [1] Cryptographic asynchronous multi-party computation with optimal resilience [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 322 - 340
- [2] Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation [J]. THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 256 - 273
- [3] A Cryptographic Look at Multi-Party Channels [J]. IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 31 - 45
- [4] Everlasting Multi-party Computation [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 380 - 397
- [7] Secure Multi-Party Computation [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
- [8] Covert multi-party computation [J]. 48TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2007, : 238 - 248
- [10] Heterogeneous Secure Multi-Party Computation [J]. NETWORKING 2012, PT II, 2012, 7290 : 198 - 210