共 50 条
- [41] Efficient fair UC-secure two-party computation on committed inputs Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, 2013, : 544 - 551
- [42] Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 18 - 35
- [43] Efficient and Cooperative Secure Two-Party Computation Based on Authenticated Garbled Circuit Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (11): : 2433 - 2455
- [44] ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
- [46] Distributed Oblivious RAM for Secure Two-Party Computation THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 377 - 396
- [47] Secure Two-Party Computation over Unreliable Channels SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 445 - 463
- [49] Rational Secure Two-party Computation in Social Cloud NETWORK AND SYSTEM SECURITY, 2014, 8792 : 476 - 483
- [50] A study of secure two-party circle computation problem Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2009, 32 (03): : 32 - 35