共 55 条
[41]
Feigenbaum J., Pinkas B., Ryger R., Saint-Jean F., Secure computation of surveys, EU Workshop on Secure Multiparty Protocols, (2004)
[42]
Bogdanov D., Talviste R., Willemson J., Deploying secure multi-party computation for financial data analysis - (short paper, Financial Cryptography, 7397, pp. 57-64, (2012)
[43]
Perry J., Gupta D., Feigenbaum J., Wright R.N., Systematizing secure computation for research, and decision support, Security, and Cryptography for Networks - 9th International Conference, 8642, pp. 380-397, (2014)
[44]
Blum M., Feldman P., Micali S., Non-interactive zero-knowledge, and its applications, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, pp. 103-112, (1988)
[45]
Galil Z., Haber S., Yung M., Cryptographic computation: Secure fault-tolerant protocols, and the public-key model (extended abstract, Advances in Cryptology - CRYPTO '87, 293, pp. 135-155, (1988)
[46]
Aumann Y., Lindell Y., Security against covert adversaries: Efficient protocols for realistic adversaries, J. Cryptology, 23, 2, pp. 281-343, (2010)
[47]
Ben-Or M., Goldwasser S., Wigderson A., Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract, Simon, 54, pp. 1-10
[48]
Fitzi M., Hirt M., Maurer U., Trading correctness for privacy in unconditional multiparty computation, Advances in Cryptology - CRYPTO '98, 1462, pp. 121-136, (1998)
[49]
Cleve R., Limits on the security of coin flips when half the processors are faulty, Proceedings of the Eighteenth Annual ACM Symposium on Theory of Computing, STOC '86, pp. 364-369, (1986)
[50]
Rabin T., Ben-Or M., Verifiable secret sharing, and multiparty protocols with honest majority (extended abstract, Johnson, 52, pp. 73-85