共 50 条
- [41] An efficient protocol for secure two-party computation in the presence of malicious adversaries [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 52 - +
- [43] Secure and Efficient Two-Party Certificateless Authenticated Key Agreement Protocol [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL III, 2009, : 308 - 311
- [44] An Efficient Identity-Based Broadcast Encryption Scheme Based on SM9 [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (05): : 897 - 907
- [45] MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 537 - 556
- [46] Cryptanalysis and improvement of the novel quantum scheme for secure two-party distance computation [J]. Quantum Information Processing, 2019, 18
- [48] Aitps: A Two-Party Signature Scheme from Asymmetry Module Lattice Problems [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (09): : 2137 - 2151
- [50] Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 137 - 147