共 50 条
- [2] Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer [J]. THEORY OF CRYPTOGRAPHY, 2011, 6597 : 329 - 346
- [4] Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 18 - 35
- [5] Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT II, 2013, 8270 : 441 - 463
- [6] Bootstrapped Oblivious Transfer and Secure Two-Party Function Computation [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 1303 - 1307
- [7] Secure Multi-Party Computation Based on Cut-and-Choose Technology [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (08): : 1800 - 1818
- [8] Distributed Oblivious RAM for Secure Two-Party Computation [J]. THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 377 - 396
- [9] On Cut-and-Choose Oblivious Transfer and Its Variants [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 386 - 412
- [10] Permutable Cut-and-Choose Oblivious Transfer and Its Application [J]. IEEE ACCESS, 2020, 8 : 17378 - 17389