共 50 条
- [41] Secure Two-Party Computation in a Quantum World APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 461 - 480
- [42] Adaptively Secure Two-Party Computation with Erasures TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 117 - 132
- [43] Secure Two-Party Computation: A Visual Way INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 18 - 38
- [45] Oblivious and Fair Server-Aided Two-Party Computation 2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 75 - 84
- [47] Secure Two-Party Computation Based on Blind Quantum Computation International Journal of Theoretical Physics, 2020, 59 : 2074 - 2082
- [48] A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 293 - 308
- [49] Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 476 - 494