共 23 条
[11]
Fitzi M, 1998, LECT NOTES COMPUT SC, V1462, P121, DOI 10.1007/BFb0055724
[12]
Gennaro R., 1998, Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, P101, DOI 10.1145/277697.277716
[13]
Goldreich O., 1987, P 19 ANN ACM S THEOR, P218, DOI DOI 10.1145/28395.28420
[14]
Hirt M., 1997, Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, P25, DOI 10.1145/259380.259412
[15]
Hirt M, 2008, LECT NOTES COMPUT SC, V5350, P1, DOI 10.1007/978-3-540-89255-7_1
[16]
Ishai Y, 2006, LECT NOTES COMPUT SC, V4117, P483
[17]
On Achieving the "Best of Both Worlds" in Secure Multiparty Computation
[J].
STOC 07: PROCEEDINGS OF THE 39TH ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING,
2007,
:11-20
[18]
Kilian J., 2000, Proceedings of the Thirty Second Annual ACM Symposium on Theory of Computing, P316, DOI 10.1145/335305.335342
[19]
Hybrid-Secure MPC: Trading Information-Theoretic Robustness for Computational Privacy
[J].
PODC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING,
2010,
:219-228
[20]
Maurer U, 2003, LECT NOTES COMPUT SC, V2576, P14