共 124 条
- [21] Wang Xiao, Malozemoff A J, Katz J., Faster secure two-party computation in the single-execution setting, Proc of Annual Int Conf on the Theory and Applications of Cryptographic Techniques, pp. 399-424, (2017)
- [22] Nielsen J B, Orlandi C., Lego for two-party secure computation, Proc of Theory of Cryptography Conf, pp. 368-386, (2009)
- [23] Frederiksen T K, Jakobsen T P, Nielsen J B, Et al., MiniLEGO: Efficient secure two-party computation from general assumptions, Proc of Annual Int Conf on the Theory and Applications of Cryptographic Techniques, pp. 537-556, (2013)
- [24] Frederiksen T K, Jakobsen T P, Nielsen J B, Et al., TinyLEGO: An interactive garbling scheme for maliciously secure two-party computation, (2015)
- [25] Kolesnikov V, Nielsen J B, Rosulek M, Et al., DUPLO: Unifying cut-and-choose for garbled circuits, Proc of the 2017 ACM SIGSAC Conf on Computer and Communications Security, pp. 3-20, (2017)
- [26] Zhu Ruiyu, Yan Huang, JIMU: Faster lego-based secure computation using additive homomorphic hashes, Proc of Int Conf on the Theory and Application of Cryptology and Information Security, pp. 529-572, (2017)
- [27] Wang Xiao, Ranellucci S, Katz J., Authenticated garbling and efficient maliciously secure two-party computation, Proc of the 2017 ACM SIGSAC Conf on Computer and Communications Security, pp. 21-37, (2017)
- [28] Katz J, Ranellucci S, Rosulek M, Et al., Optimizing authenticated garbling for faster secure two-party computation, Proc of Annual Int Cryptology Conf, pp. 365-391, (2018)
- [29] Yang Kang, Wang Xiao, Zhang Jiang, More efficient MPC from improved triple generation and authenticated garbling, Proc of the 2020 ACM SIGSAC Conf on Computer and Communications Security, pp. 1627-1646, (2020)
- [30] Bellare M, Hoang V T, Keelveedhi S, Et al., Efficient garbling from a fixed-key blockcipher, Proc of 2013 IEEE Symp on Security and Privacy, pp. 478-492, (2013)