共 50 条
- [21] Quantum secret sharing based on Smolin bound entangled states isnot unconditionally secure QUANTUM OPTICS, OPTICAL DATA STORAGE, AND ADVANCED MICROLITHOGRAPHY, 2008, 6827
- [22] Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2009, 25 (03): : 352 - 357
- [24] Non-Interactive Secure Computation Based on Cut-and-Choose ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 387 - 404
- [25] Hide the Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT INFORMATION SECURITY (ISC 2018), 2018, 11060 : 250 - 267
- [26] Subset Sum-Based Verifiable Secret Sharing Scheme for Secure Multiparty Computation RECENT ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY 2018, 2019, 769 : 209 - 219
- [28] Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 425 - 439
- [30] Non-Interactive and secure outsourcing of PCA-Based face recognition Ren, Yanli (renyanli@shu.edu.cn), 1600, Elsevier Ltd (110):