Verifiable threshold secret sharing and full fair secure two-party computation

被引:0
|
作者
School of Computer Science and Technology, Harbin Institute of Technology, Haerbin, China [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
2009 International e-Conference on Advanced Science and Technology, AST 2009
中图分类号
学科分类号
摘要
Computer circuits - Cryptography
引用
收藏
相关论文
共 50 条
  • [21] Rational secure two-party computation protocol
    Zhang, En
    Cai, Yongquan
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50 (07): : 1409 - 1417
  • [22] An improved secure two-party computation protocol
    Yu, Y
    Leiwo, J
    Premkumar, B
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 221 - 232
  • [23] Complete Fairness in Secure Two-Party Computation
    Gordon, S. Dov
    Hazay, Carmit
    Katz, Jonathan
    Lindell, Yehuda
    STOC'08: PROCEEDINGS OF THE 2008 ACM INTERNATIONAL SYMPOSIUM ON THEORY OF COMPUTING, 2008, : 413 - +
  • [24] Secure Two-Party Computation with Low Communication
    Damgard, Ivan
    Faust, Sebastian
    Hazay, Carmit
    THEORY OF CRYPTOGRAPHY (TCC 2012), 2012, 7194 : 54 - 74
  • [25] Partial Fairness in Secure Two-Party Computation
    Gordon, S. Dov
    Katz, Jonathan
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 157 - 176
  • [26] Fairplay - A secure two-party computation system
    Malkhi, D
    Nisan, N
    Pinkas, B
    Sella, Y
    USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, 2004, : 287 - 302
  • [27] Complete Fairness in Secure Two-Party Computation
    Gordon, S. Dov
    Hazay, Carmit
    Katz, Jonathan
    Lindell, Yehuda
    JOURNAL OF THE ACM, 2011, 58 (06)
  • [28] Partial Fairness in Secure Two-Party Computation
    S. Dov Gordon
    Jonathan Katz
    Journal of Cryptology, 2012, 25 : 14 - 40
  • [29] Impossibility of secure two-party classical computation
    Colbeck, Roger
    PHYSICAL REVIEW A, 2007, 76 (06)
  • [30] Secure Two-Party Computation in a Quantum World
    Buescher, Niklas
    Demmler, Daniel
    Karvelas, Nikolaos P.
    Katzenbeisser, Stefan
    Kraemer, Juliane
    Rathee, Deevashwer
    Schneider, Thomas
    Struck, Patrick
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 461 - 480