共 38 条
[1]
Araki T., 2016, ACM CCS
[2]
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[3]
Ben-Sasson E, 2012, LECT NOTES COMPUT SC, V7417, P663
[4]
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III,
2019, 11694
:67-97
[5]
Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:869-886
[6]
Byali M., 2019, ACM CCS
[7]
Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
[8]
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III,
2018, 10993
:34-64
[9]
Cleve R., 1990, ACM S THEOR COMP
[10]
Cramer R, 2005, LECT NOTES COMPUT SC, V3378, P342