共 50 条
- [33] Secure Two-Party Computation in a Quantum World APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 461 - 480
- [34] Adaptively Secure Two-Party Computation with Erasures TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 117 - 132
- [35] Secure Two-Party Computation: A Visual Way INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 18 - 38
- [37] Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions THEORY OF CRYPTOGRAPHY, TCC 2017, PT I, 2017, 10677 : 581 - 611
- [38] Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals INFORMATION SECURITY, ISC 2023, 2023, 14411 : 309 - 326
- [39] Gate evaluation secret sharing and secure one-round two-party computation ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 136 - 155