共 50 条
- [1] Efficient Fair UC-Secure Two-Party Computation on Committed Inputs 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 544 - 551
- [2] Efficient fair UC-secure two-party computation on committed inputs Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, 2013, : 544 - 551
- [3] Efficient Fair Secure Two-Party Computation 2012 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE (APSCC), 2012, : 243 - 248
- [4] An efficient protocol for fair secure two-party computation TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 88 - 105
- [5] Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 21 - 37
- [6] Geometry of Secure Two-party Computation 2022 IEEE 63RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2022, : 1035 - 1044
- [7] Secure Two-Party Computation Is Practical ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 250 - +
- [8] Efficient Secure Two-Party Computation with Untrusted Hardware Tokens TOWARDS HARDWARE-INTRINSIC SECURITY: FOUNDATIONS AND PRACTICE, 2010, : 367 - 386
- [9] PrivC-A Framework for Efficient Secure Two-Party Computation SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 394 - 407
- [10] On the Power of Secure Two-Party Computation ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 397 - 429