共 50 条
- [2] Information theoretically secure oblivious polynomial evaluation: Model, bounds, and constructions INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 62 - 73
- [3] Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries PROCEEDINGS OF THE TENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2020, 2020, : 165 - 167
- [4] Information-theoretically secure keyless authentication 2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 20 - 20
- [5] Information-Theoretically Secure Key Generation and Management 2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 1529 - 1533
- [7] On the Security of Pseudorandomized Information-Theoretically Secure Schemes INFORMATION THEORETIC SECURITY, 2010, 5973 : 56 - 73
- [8] On Optimal Information-Theoretically Secure Key Management 2019 16TH CANADIAN WORKSHOP ON INFORMATION THEORY (CWIT), 2019,
- [9] Parallel reducibility for information-theoretically secure computation ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 74 - 92