共 50 条
- [41] Towards Characterizing Complete Fairness in Secure Two-Party Computation THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 291 - 316
- [43] One-Sided Adaptively Secure Two-Party Computation THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 368 - 393
- [44] Legally-enforceable fairness in secure two-party computation TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 121 - 137
- [46] Bootstrapped Oblivious Transfer and Secure Two-Party Function Computation 2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 1303 - 1307
- [47] Rational adversary with flexible utility in secure two-party computation Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 2913 - 2927
- [48] Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks 2015 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW), 2015, : 198 - 205
- [50] Hiding the Input-Size in Secure Two-Party Computation ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT II, 2013, 8270 : 421 - 440