Verifiable threshold secret sharing and full fair secure two-party computation

被引:0
|
作者
School of Computer Science and Technology, Harbin Institute of Technology, Haerbin, China [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
2009 International e-Conference on Advanced Science and Technology, AST 2009
中图分类号
学科分类号
摘要
Computer circuits - Cryptography
引用
收藏
相关论文
共 50 条
  • [31] Partial Fairness in Secure Two-Party Computation
    Gordon, S. Dov
    Katz, Jonathan
    JOURNAL OF CRYPTOLOGY, 2012, 25 (01) : 14 - 40
  • [32] Adaptively Secure Two-Party Computation with Erasures
    Lindell, Andrew Y.
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 117 - 132
  • [33] Secure Two-Party Computation: A Visual Way
    D'Arco, Paolo
    De Prisco, Roberto
    INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 18 - 38
  • [34] Privacy-Preserving Edit Distance Computation Using Secret-Sharing Two-Party Computation
    Vanegas, Hernan
    Cabarcas, Daniel
    Aranha, Diego F.
    PROGRESS IN CRYPTOLOGY, LATINCRYPT 2023, 2023, 14168 : 67 - 86
  • [35] Secure Two-Party Computation Based on Blind Quantum Computation
    Zhu, Yaqing
    Li, Qin
    Liu, Chengdong
    Sun, Zhiwei
    Peng, Yu
    Shen, Dongsu
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (07) : 2074 - 2082
  • [36] Secure Two-Party Computation Based on Blind Quantum Computation
    Yaqing Zhu
    Qin Li
    Chengdong Liu
    Zhiwei Sun
    Yu Peng
    Dongsu Shen
    International Journal of Theoretical Physics, 2020, 59 : 2074 - 2082
  • [37] Information theoretical analysis of two-party secret computation
    Wang, Da-Wei
    Liau, Churn-Jung
    Chiang, Yi-Ting
    Hsu, Tsan-Sheng
    DATA AND APPLICATIONS SECURITY XX, PROCEEDINGS, 2006, 4127 : 310 - 317
  • [38] Secure Computation of Two-party Multisets with Rational Numbers
    Wang, Weiqiong
    Xie, Qiong
    Xu, Haojie
    Cui, Meng
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (05) : 1722 - 1730
  • [39] Distributed Oblivious RAM for Secure Two-Party Computation
    Lu, Steve
    Ostrovsky, Rafail
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 377 - 396
  • [40] Secure Two-Party Computation over Unreliable Channels
    Gelles, Ran
    Paskin-Cherniavsky, Anat
    Zikas, Vassilis
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 445 - 463