共 50 条
- [32] Adaptively Secure Two-Party Computation with Erasures TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 117 - 132
- [33] Secure Two-Party Computation: A Visual Way INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 18 - 38
- [34] Privacy-Preserving Edit Distance Computation Using Secret-Sharing Two-Party Computation PROGRESS IN CRYPTOLOGY, LATINCRYPT 2023, 2023, 14168 : 67 - 86
- [36] Secure Two-Party Computation Based on Blind Quantum Computation International Journal of Theoretical Physics, 2020, 59 : 2074 - 2082
- [37] Information theoretical analysis of two-party secret computation DATA AND APPLICATIONS SECURITY XX, PROCEEDINGS, 2006, 4127 : 310 - 317
- [39] Distributed Oblivious RAM for Secure Two-Party Computation THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 377 - 396
- [40] Secure Two-Party Computation over Unreliable Channels SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 445 - 463