共 27 条
[1]
[Anonymous], 1981, TR81 HARV U
[2]
[Anonymous], P INT C CYB SIT AW D
[4]
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation
[J].
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015),
2015,
[5]
Goldreich O., 2009, FDN CRYPTOGRAPHY, V2
[6]
FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System
[J].
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:95-106
[7]
Impagliazzo R., 1989, Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, P44, DOI 10.1145/73007.73012
[9]
Kilian J., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P20, DOI 10.1145/62212.62215
[10]
Lindell Y, 2017, INFORM SEC CRYPT TEX, P277, DOI 10.1007/978-3-319-57048-8_6