共 38 条
[1]
Removing Erasures with Explainable Hash Proof Systems
[J].
PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT I,
2017, 10174
:151-174
[2]
Asharov G, 2012, LECT NOTES COMPUT SC, V7237, P483, DOI 10.1007/978-3-642-29011-4_29
[3]
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[4]
k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II,
2018, 10821
:500-532
[5]
Hash Proof Systems over Lattices Revisited
[J].
PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II,
2018, 10770
:644-674
[6]
Boyle E., 2018, ITCS
[7]
Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II,
2017, 10211
:163-193
[8]
Function Secret Sharing: Improvements and Extensions
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:1292-1303
[9]
Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I,
2016, 9814
:190-213
[10]
Canetti R., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P19