共 50 条
- [31] Information-Theoretically Secure Three-Party Computation with One Corrupted Party 2013 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2013, : 3160 - +
- [33] Information-theoretically secure oblivious polynomial evaluation in the commodity-based model International Journal of Information Security, 2015, 14 : 73 - 84
- [35] Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications INFORMATION SECURITY AND PRIVACY, ACISP 2020, 2020, 12248 : 664 - 673
- [36] Security research on an information-theoretically secure secret key agreement using LDPC matrices PROCEEDINGS OF THE THIRD CHINAGRID ANNUAL CONFERENCE, 2008, : 197 - 201
- [39] Secure and efficient encrypted keyword search for multi-user setting in cloud computing Peer-to-Peer Networking and Applications, 2019, 12 : 32 - 42