共 50 条
- [41] An efficient protocol for fair secure two-party computation TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 88 - 105
- [42] Distributed Oblivious RAM for Secure Two-Party Computation THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 377 - 396
- [43] Secure Two-Party Computation over Unreliable Channels SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 445 - 463
- [45] Rational Secure Two-party Computation in Social Cloud NETWORK AND SYSTEM SECURITY, 2014, 8792 : 476 - 483
- [46] A study of secure two-party circle computation problem Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2009, 32 (03): : 32 - 35
- [47] Completeness in Two-Party Secure Computation: A Computational View Journal of Cryptology, 2006, 19 : 521 - 552
- [49] Efficiently Making Secure Two-Party Computation Fair FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 : 188 - 207
- [50] Outsourcing Secure Two-Party Computation as a Black Box CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 214 - 222