共 81 条
[1]
Non-malleable Codes from Additive Combinatorics
[J].
STOC'14: PROCEEDINGS OF THE 46TH ANNUAL 2014 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2014,
:774-783
[2]
Ligero: Lightweight Sublinear Arguments Without a Trusted Setup
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:2087-2104
[3]
[Anonymous], 2004, FDN CRYPTOGRAPHY BAS
[4]
Promise Zero Knowledge and Its Applications to Round Optimal MPC
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II,
2018, 10992
:459-487
[5]
Barak B, 2002, ANN IEEE SYMP FOUND, P345, DOI 10.1109/SFCS.2002.1181957
[6]
How to go beyond the black-box simulation barrier
[J].
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2001,
:106-115
[7]
Barak B, 2006, ANN IEEE SYMP FOUND, P345
[8]
UNIVERSAL ARGUMENTS AND THEIR APPLICATIONS
[J].
SIAM JOURNAL ON COMPUTING,
2008, 38 (05)
:1661-1694
[9]
Barin S., 2022, ENG SCI TECHNOL INT, V34, P101174, DOI [10.3390/biophysica2030025, 10.1016/j.jestch.2022.101174]
[10]
Bellare M., 1993, P 1 ACM C COMP COMM, P62, DOI [10.1145/168588.168596, DOI 10.1145/168588.168596]