共 50 条
- [31] Constant-Round Maliciously Secure Two-Party Computation in the RAM Model THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 521 - 553
- [32] Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model STOC'17: PROCEEDINGS OF THE 49TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2017, : 497 - 509
- [35] Perfectly Secure Message Transmission in Two Rounds THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 286 - 304
- [37] Introduction to secure computation LECTURES ON DATA SECURITY: MODERN CRYPTOLOGY IN THEORY AND PRACTICE, 1999, 1561 : 16 - 62
- [40] Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation Journal of Cryptology, 2003, 16 : 143 - 184