共 50 条
- [1] Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, 2014, : 893 - 908
- [2] Efficient Fair Secure Two-Party Computation 2012 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE (APSCC), 2012, : 243 - 248
- [3] An efficient protocol for fair secure two-party computation TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 88 - 105
- [4] Efficient two-party secure computation on committed inputs ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 97 - +
- [5] Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 21 - 37
- [6] Geometry of Secure Two-party Computation 2022 IEEE 63RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2022, : 1035 - 1044
- [7] Secure Two-Party Computation Is Practical ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 250 - +
- [8] PrivC-A Framework for Efficient Secure Two-Party Computation SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 394 - 407
- [9] On the Power of Secure Two-Party Computation ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 397 - 429
- [10] Secrecy of two-party secure computation DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 114 - 123