共 34 条
- [1] [Anonymous], 1990, LNCS
- [2] [Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]
- [3] Asharov G., 2011, IACR CRYPTOL EPRINT, V2011, P136
- [4] Asharov G, 2011, LECT NOTES COMPUT SC, V6841, P240, DOI 10.1007/978-3-642-22792-9_14
- [5] BEAVER D, 1990, LECT NOTES COMPUT SC, V435, P560
- [6] Beaver D., 1992, CRYPTO, V576, P377, DOI DOI 10.1007/3-540-46766-1
- [7] Beerliová-Trubíniová Z, 2008, LECT NOTES COMPUT SC, V4948, P213, DOI 10.1007/978-3-540-78524-8_13
- [9] Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
- [10] Universally composable security: A new paradigm for cryptographic protocols [J]. 42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145