共 23 条
- [11] Fitzi M, 1998, LECT NOTES COMPUT SC, V1462, P121, DOI 10.1007/BFb0055724
- [12] Gennaro R., 1998, Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, P101, DOI 10.1145/277697.277716
- [13] Goldreich O., 1987, P 19 ANN ACM S THEOR, P218, DOI DOI 10.1145/28395.28420
- [14] Hirt M., 1997, Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, P25, DOI 10.1145/259380.259412
- [15] Hirt M, 2008, LECT NOTES COMPUT SC, V5350, P1, DOI 10.1007/978-3-540-89255-7_1
- [16] Ishai Y, 2006, LECT NOTES COMPUT SC, V4117, P483
- [17] On Achieving the "Best of Both Worlds" in Secure Multiparty Computation [J]. STOC 07: PROCEEDINGS OF THE 39TH ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, 2007, : 11 - 20
- [18] Kilian J., 2000, Proceedings of the Thirty Second Annual ACM Symposium on Theory of Computing, P316, DOI 10.1145/335305.335342
- [19] Hybrid-Secure MPC: Trading Information-Theoretic Robustness for Computational Privacy [J]. PODC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 2010, : 219 - 228
- [20] Maurer U, 2003, LECT NOTES COMPUT SC, V2576, P14