共 23 条
[1]
Beaver D., 1991, Journal of Cryptology, V4, P75, DOI 10.1007/BF00196771
[2]
BEAVER D, 1998, LECT NOTES COMPUTER, V1403, P25
[3]
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[4]
BERMAN P, 1989, P 30 ANN S FDN COMP, P410, DOI DOI 10.1109/SFCS.1989.63511
[6]
Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
[7]
Cramer R, 2000, LECT NOTES COMPUT SC, V1807, P316
[8]
Cramer R, 1999, LECT NOTES COMPUT SC, V1592, P311
[9]
Fehr S, 2002, LECT NOTES COMPUT SC, V2442, P565