共 17 条
[1]
[Anonymous], INT BUSINESS TIMES
[2]
Asharov G., 2011, IACR CRYPTOL EPRINT, V2011, P136
[3]
Ben-Or M., 1988, P STOC
[4]
BENALOH JC, 1987, LECT NOTES COMPUT SC, V263, P251
[5]
CHAUM D, SECRET BALLOT RECEIP
[6]
Chaum D., 1988, P STOC
[8]
Cimato S, 2012, DIGIT IMAG COMPUT, P1
[9]
Secure Two-Party Computation: A Visual Way
[J].
INFORMATION THEORETIC SECURITY, ICITS 2013,
2014, 8317
:18-38