共 79 条
[1]
O-PSI: Delegated Private Set Intersection on Outsourced Datasets
[J].
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION,
2015, 455
:3-17
[2]
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:805-817
[3]
Badrinarayanan S., 2020, IACR Cryptology ePrint Archive, P600
[4]
BEAVER D, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P503, DOI 10.1145/100216.100287
[5]
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[6]
Blakley GR, 1979, P AFIPS NEW YORK NY, P313, DOI DOI 10.1109/MARK.1979.8817296
[7]
Bogdanov D, 2008, LECT NOTES COMPUT SC, V5283, P192
[8]
Threshold Cryptosystems from Threshold Fully Homomorphic Encryption
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I,
2018, 10991
:565-596
[9]
Efficient Pseudorandom Correlation Generators: Silent OT Extension and More
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III,
2019, 11694
:489-518
[10]
Branco Pedro, 2020, IACR CRYPTOL EPRINT, V2020, P1307