共 50 条
- [31] Completeness in Two-Party Secure Computation: A Computational View Journal of Cryptology, 2006, 19 : 521 - 552
- [32] Efficiently Making Secure Two-Party Computation Fair FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 : 188 - 207
- [34] Round-optimal secure two-party computation ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 335 - 354
- [35] Outsourcing Secure Two-Party Computation as a Black Box CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 214 - 222
- [36] Fair secure two-party computation - Extended abstract ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 87 - 105
- [37] Efficient two-party secure computation on committed inputs ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 97 - +
- [38] A novel quantum scheme for secure two-party distance computation Quantum Information Processing, 2017, 16
- [39] Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 21 - 37
- [40] Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation THEORY OF CRYPTOGRAPHY (TCC 2015), PT II, 2015, 9015 : 557 - 585