共 50 条
- [31] Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 1 - 17
- [32] Efficient Constructions of Non-interactive Secure Multiparty Computation from Pairwise Independent Hashing PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 322 - 329
- [33] Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 291 - 308
- [34] A SECURE GROUP COMMUNICATION USING NON-INTERACTIVE KEY COMPUTATION IN MULTIPARTY KEY AGREEMENT ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 568 - 572
- [35] On Tightly Secure Non-Interactive Key Exchange ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 65 - 94
- [36] Adaptively Secure Non-interactive Threshold Cryptosystems Automata, Languages and Programming, ICALP, Pt II, 2011, 6756 : 588 - 600
- [37] DUPLO: Unifying Cut-and-Choose for Garbled Circuits CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 3 - 20
- [38] On Cut-and-Choose Oblivious Transfer and Its Variants ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 386 - 412
- [39] Secure Non-interactive Simulation: Feasibility and Rate ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT III, 2022, 13277 : 767 - 796