共 50 条
- [21] On Secure Two-Party Computation in Three Rounds THEORY OF CRYPTOGRAPHY, TCC 2017, PT I, 2017, 10677 : 612 - 644
- [22] Bounded-concurrent secure two-party computation in a constant number of rounds 44TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2003, : 404 - 413
- [23] An improved secure two-party computation protocol INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 221 - 232
- [24] Rational secure two-party computation protocol Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50 (07): : 1409 - 1417
- [25] Complete Fairness in Secure Two-Party Computation STOC'08: PROCEEDINGS OF THE 2008 ACM INTERNATIONAL SYMPOSIUM ON THEORY OF COMPUTING, 2008, : 413 - +
- [26] Secure Two-Party Computation with Low Communication THEORY OF CRYPTOGRAPHY (TCC 2012), 2012, 7194 : 54 - 74
- [27] Partial Fairness in Secure Two-Party Computation ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 157 - 176
- [28] Fairplay - A secure two-party computation system USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, 2004, : 287 - 302
- [29] Efficient Fair Secure Two-Party Computation 2012 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE (APSCC), 2012, : 243 - 248