共 50 条
- [31] Adaptively secure feldman VSS and applications to universally-composable threshold cryptography ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 317 - 334
- [32] Universally composable secure proxy re-signature scheme with effective calculation CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S10075 - S10084
- [33] Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS NETWORK AND SYSTEM SECURITY, 2014, 8792 : 110 - 123
- [34] Universally composable multi-party computation with an unreliable common reference string THEORY OF CRYPTOGRAPHY, 2008, 4948 : 142 - +
- [36] Secure Maximum (Minimum) Computation in Malicious Model 1600, Science Press (44): : 2076 - 2089
- [37] Feasibility and Infeasibility of Secure Computation with Malicious PUFs ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 405 - 420
- [38] Feasibility and Infeasibility of Secure Computation with Malicious PUFs Journal of Cryptology, 2020, 33 : 595 - 617
- [40] Universally composable secure TNC model and EAP-TNC protocol in IF-T Science China Information Sciences, 2010, 53 : 465 - 482