共 50 条
- [1] Secure Multiparty RAM Computation in Constant Rounds THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 491 - 520
- [2] Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds THEORY OF CRYPTOGRAPHY (TCC 2015), PT II, 2015, 9015 : 586 - 613
- [3] Perfect Secure Computation in Two Rounds THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 : 152 - 174
- [5] Bounded-concurrent secure two-party computation in a constant number of rounds 44TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2003, : 404 - 413
- [6] Positive Results for Concurrently Secure Computation in the Plain Model 2012 IEEE 53RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2012, : 41 - 50
- [7] Concurrently Composable Non-interactive Secure Computation ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT I, 2022, 13791 : 526 - 555
- [8] On Concurrently Secure Computation in the Multiple Ideal Query Model ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 684 - 701
- [9] Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 285 - 304
- [10] Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 : 163 - 193