共 50 条
- [1] Non-interactive manual channel message authentication based on eTCR hash functions [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 385 - +
- [2] Non-Interactive Secure Multiparty Computation [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 387 - 404
- [3] Reusable Non-Interactive Secure Computation [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 462 - 488
- [4] Efficient Non-interactive Secure Computation [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 406 - +
- [5] Succinct Non-interactive Secure Computation [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II, 2020, 12106 : 216 - 245
- [6] Secure Non-interactive Reducibility is Decidable [J]. THEORY OF CRYPTOGRAPHY, TCC 2022, PT II, 2022, 13748 : 408 - 437
- [7] On Tightly Secure Non-Interactive Key Exchange [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 65 - 94
- [8] Adaptively Secure Non-interactive Threshold Cryptosystems [J]. Automata, Languages and Programming, ICALP, Pt II, 2011, 6756 : 588 - 600
- [9] On the (in)efficiency of non-interactive secure multiparty computation [J]. Designs, Codes and Cryptography, 2018, 86 : 1793 - 1805
- [10] Robust non-interactive oblivious transfer [J]. IEEE COMMUNICATIONS LETTERS, 2003, 7 (04) : 153 - 155