共 50 条
- [21] Research on Secure Scalar Product Protocol and its' Application [J]. 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
- [24] k-out-of-n Oblivious transfer protocol with security against malicious adversaries [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2017, 32 (02): : 81 - 91
- [25] Post-quantum secure two-party computing protocols against malicious adversaries [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (04):
- [29] A protocol for the secure two-party quantum scalar product [J]. PHYSICS LETTERS A, 2012, 376 (16) : 1323 - 1327
- [30] Fast Secure Scalar Product Protocol with (almost) Optimal Efficiency [J]. COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS, AND WORKSHARING, COLLABORATECOM 2015, 2016, 163 : 234 - 242