共 50 条
- [33] Secure Two-Party Computation: A Visual Way INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 18 - 38
- [34] Secure Two-Party Computation in a Quantum World APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 461 - 480
- [36] Revisiting the efficiency of malicious two-party computation Advances in Cryptology - EUROCRYPT 2007, 2007, 4515 : 79 - 96
- [37] Adaptively Secure Two-Party Computation with Erasures TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 117 - 132
- [38] Distributing the Setup in Universally Composable Multi-Party Computation PROCEEDINGS OF THE 2014 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC'14), 2014, : 20 - 29
- [39] Application of Blind Quantum Computation to Two-Party Quantum Computation International Journal of Theoretical Physics, 2018, 57 : 1864 - 1871