共 37 条
- [1] Yao A.C.C., How to generate and exchange secrets, Proc of the 27th Annual Symp on Foundations of Computer Science, pp. 162-167, (1986)
- [2] Feige U., Kilian J., Naor M., A minimal model for secure computation (extendedabstract), Proc of the 26th ACM Symp on Theory of Computing, pp. 554-563, (1994)
- [3] Cramer R., Damgard I., Maurer U., General secure multi-party computation from any linear secret-sharing scheme, Proc of the 19th Int Conf on the Theory and Applications of Cryptographic Techniques, pp. 316-334, (2000)
- [4] Cramer R., Damgard I., Nielsen J.B., Multiparty computation from threshold homomorphic encryption, Proc of the 20th Int Conf on the Theory and Applications of Cryptographic Techniques, pp. 280-300, (2001)
- [5] Kamara S., Mohassel P., Raykova M., Outsourcing multi-party computation, IACR Cryptology ePrint Archive
- [6] Damgard I., Faust S., Hazay C., Secure two-party computation with low communication, Proc of the 9th Theory of Cryptography Conf, pp. 54-74, (2012)
- [7] Kamara S., Mohassel P., Riva B., Salus: A system for server-aided secure function evaluation, Proc of the 2012 ACM Conf on Computer and communications security, pp. 797-808, (2012)
- [8] Carter H., Mood B., Traynor P., Et al., Secure outsourced garbled circuit evaluation for mobile devices, Journal of Computer Security, 24, 2, pp. 137-180, (2016)
- [9] Carter H., Lever C., Traynor P., Whitewash: Outsourcing garbled circuit generation for mobile devices, Proc of the 30th Annual Computer Security Applications Conf, pp. 266-275, (2014)
- [10] Kerschbaum F., Oblivious outsourcing of garbled circuit generation, Proc of the 30th Annual ACM Symp on Applied Computing, pp. 2134-2140, (2015)