共 50 条
- [21] Two-Round Secure MPC from Indistinguishability Obfuscation THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 74 - 94
- [22] Two-Round Oblivious Transfer from CDH or LPN ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II, 2020, 12106 : 768 - 797
- [24] Two-Round Oblivious Linear Evaluation from Learning with Errors PUBLIC-KEY CRYPTOGRAPHY - PKC 2022, PT I, 2022, 13177 : 379 - 408
- [26] Garbled Protocols and Two-Round MPC from Bilinear Maps 2017 IEEE 58TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2017, : 588 - 599
- [27] Two-Round Man-in-the-Middle Security from LPN THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I, 2016, 9562 : 225 - 248
- [28] Two-Round Multiparty Secure Computation from Minimal Assumptions ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 : 468 - 499
- [29] Two-Round PAKE from Approximate SPH and Instantiations from Lattices ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III, 2017, 10626 : 37 - 67
- [30] Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation THEORY OF CRYPTOGRAPHY (TCC 2015), PT II, 2015, 9015 : 614 - 637