共 30 条
[1]
BEAVER D, 1992, LECT NOTES COMPUT SC, V576, P420
[2]
Turbospeedz: Double Your Online SPDZ! Improving SPDZ Using Function Dependent Preprocessing
[J].
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019,
2019, 11464
:530-549
[3]
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[4]
Bendlin R, 2011, LECT NOTES COMPUT SC, V6632, P169, DOI 10.1007/978-3-642-20465-4_11
[5]
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III,
2019, 11694
:67-97
[6]
Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2020, PT III,
2020, 12493
:244-276
[7]
Efficient Pseudorandom Correlation Generators from Ring-LPN
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT II,
2020, 12171
:387-416
[8]
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:291-308
[9]
Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:869-886
[10]
Secure Computation with Preprocessing via Function Secret Sharing
[J].
THEORY OF CRYPTOGRAPHY, TCC 2019, PT I,
2019, 11891
:341-371