共 50 条
- [31] LEGO for Two-Party Secure Computation THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 368 - 386
- [36] A brief survey on secure multi-party computing in the presence of rational parties Journal of Ambient Intelligence and Humanized Computing, 2015, 6 : 807 - 824
- [37] An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries Journal of Cryptology, 2015, 28 : 312 - 350
- [38] An efficient protocol for secure two-party computation in the presence of malicious adversaries ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 52 - +
- [40] On Secure Two-Party Computation in Three Rounds THEORY OF CRYPTOGRAPHY, TCC 2017, PT I, 2017, 10677 : 612 - 644