共 50 条
- [31] Efficient information-theoretically secure schemes for cloud data outsourcing Cluster Computing, 2021, 24 : 3591 - 3606
- [33] Rational Secret Sharing Information-theoretically Secure Against Adaptive Adversaries 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 249 - 256
- [35] Identity-based key-insulated signature with secure key-updates INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 13 - +
- [36] Information-Theoretically Secure Three-Party Computation with One Corrupted Party 2013 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2013, : 3160 - +
- [38] Security analysis on "Strongly secure certificateless key-insulated signature secure in the standard model" 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 195 - 198
- [40] Information-Theoretically Secure Multi-Party Linear Regression and Logistic Regression 2023 IEEE/ACM 23RD INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING WORKSHOPS, CCGRIDW, 2023, : 192 - 199