共 50 条
- [31] Blind Quantum Signature with Blind Quantum Computation International Journal of Theoretical Physics, 2017, 56 : 1108 - 1115
- [32] Blind Quantum Computation with Two Decoy States ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 2, 2017, 64 : 155 - 162
- [33] On Secure Two-Party Computation in Three Rounds THEORY OF CRYPTOGRAPHY, TCC 2017, PT I, 2017, 10677 : 612 - 644
- [34] Statistical Security in Two-Party Computation Revisited THEORY OF CRYPTOGRAPHY, TCC 2022, PT II, 2022, 13748 : 181 - 210
- [35] Two-Party Function Computation on the Reconciled Data 2017 55TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2017, : 390 - 396
- [36] Efficiency tradeoffs for malicious two-party computation PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 458 - 473
- [37] Rational secure two-party computation protocol Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50 (07): : 1409 - 1417
- [38] An improved secure two-party computation protocol INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 221 - 232
- [39] Complete Fairness in Secure Two-Party Computation STOC'08: PROCEEDINGS OF THE 2008 ACM INTERNATIONAL SYMPOSIUM ON THEORY OF COMPUTING, 2008, : 413 - +
- [40] Secure Two-Party Computation with Low Communication THEORY OF CRYPTOGRAPHY (TCC 2012), 2012, 7194 : 54 - 74