共 22 条
- [1] Secure Multiparty Computation: From Millionaires Problem to Anonymizer [J]. INFORMATION SECURITY JOURNAL, 2011, 20 (01): : 25 - 33
- [2] Secure Multiparty Computation from SGX [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2017, 2017, 10322 : 477 - 497
- [3] A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 20 - 33
- [4] Zero-Knowledge from Secure Multiparty Computation [J]. STOC 07: PROCEEDINGS OF THE 39TH ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, 2007, : 21 - 30
- [5] Binary AMD Circuits from Secure Multiparty Computation [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 336 - 366
- [6] Round Optimal Secure Multiparty Computation from Minimal Assumptions [J]. THEORY OF CRYPTOGRAPHY, TCC 2020, PT II, 2020, 12551 : 291 - 319
- [7] ZERO-KNOWLEDGE PROOFS FROM SECURE MULTIPARTY COMPUTATION [J]. SIAM JOURNAL ON COMPUTING, 2009, 39 (03) : 1121 - 1152
- [8] Two-Round Multiparty Secure Computation from Minimal Assumptions [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 : 468 - 499
- [9] Multiparty Reusable Non-interactive Secure Computation from LWE [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II, 2021, 12697 : 724 - 753
- [10] Committed MPC Maliciously Secure Multiparty Computation from Homomorphic Commitments [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 587 - 619