共 50 条
- [42] Secure Two-Party Computation Based on Blind Quantum Computation International Journal of Theoretical Physics, 2020, 59 : 2074 - 2082
- [44] An efficient protocol for fair secure two-party computation TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 88 - 105
- [45] Practical two-party computation based on the conditional gate ADVANCES IN CRYPTOLOGY - ASIACRYPT 2004, PROCEEDINGS, 2004, 3329 : 119 - 136
- [46] Distributed Oblivious RAM for Secure Two-Party Computation THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 377 - 396
- [47] Information theoretical analysis of two-party secret computation DATA AND APPLICATIONS SECURITY XX, PROCEEDINGS, 2006, 4127 : 310 - 317
- [48] Secure Two-Party Computation over Unreliable Channels SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 445 - 463
- [49] A study of secure two-party circle computation problem Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2009, 32 (03): : 32 - 35