共 50 条
- [22] Geometry of Secure Two-party Computation 2022 IEEE 63RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2022, : 1035 - 1044
- [23] Secure Two-Party Computation Is Practical ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 250 - +
- [24] On the Power of Secure Two-Party Computation ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 397 - 429
- [25] Secrecy of two-party secure computation DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 114 - 123
- [28] LEGO for Two-Party Secure Computation THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 368 - 386
- [29] TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2263 - 2276
- [30] On Secure Two-Party Computation in Three Rounds THEORY OF CRYPTOGRAPHY, TCC 2017, PT I, 2017, 10677 : 612 - 644