Verifiable threshold secret sharing and full fair secure two-party computation

被引:0
|
作者
School of Computer Science and Technology, Harbin Institute of Technology, Haerbin, China [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
2009 International e-Conference on Advanced Science and Technology, AST 2009
中图分类号
学科分类号
摘要
Computer circuits - Cryptography
引用
收藏
相关论文
共 50 条
  • [1] Verifiable Threshold Secret Sharing and Full Fair Secure Two-party Computation
    Ye Jian-wei
    Jiao Xu-lu
    Zhang Yong-zheng
    AST: 2009 INTERNATIONAL E-CONFERENCE ON ADVANCED SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2009, : 78 - +
  • [2] Efficient Fair Secure Two-Party Computation
    Ruan, Ou
    Zhou, Jing
    Zheng, Minghui
    Cui, Guohua
    2012 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE (APSCC), 2012, : 243 - 248
  • [3] An efficient protocol for fair secure two-party computation
    Kiraz, Mehmet S.
    Schoenmakers, Berry
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 88 - 105
  • [4] Efficiently Making Secure Two-Party Computation Fair
    Kilinc, Handan
    Kupcu, Alptekin
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 : 188 - 207
  • [5] Fair secure two-party computation - Extended abstract
    Pinkas, B
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 87 - 105
  • [6] Gate evaluation secret sharing and secure one-round two-party computation
    Kolesnikov, V
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 136 - 155
  • [7] Fair secure two-party computation protocol based on game theory
    Wang, Jie
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2016, 51 (05): : 902 - 909
  • [8] An efficient fair UC-secure protocol for two-party computation
    Ruan, Ou
    Chen, Jing
    Zhou, Jing
    Cui, Yongquan
    Zhang, Mingwu
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (08) : 1253 - 1263
  • [9] Hidden Δ-Fairness: A Novel Notion for Fair Secure Two-Party Computation
    Bayreuther, Saskia
    Berger, Robin
    Doerre, Felix
    Mechler, Jeremias
    Mueller-Quade, Joern
    INFORMATION SECURITY AND PRIVACY, PT II, ACISP 2024, 2024, 14896 : 330 - 349
  • [10] Geometry of Secure Two-party Computation
    Basu, Saugata
    Khorasgani, Hamidreza Amini
    Maji, Hemanta K.
    Nguyen, Hai H.
    2022 IEEE 63RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2022, : 1035 - 1044