共 38 条
[1]
Secure Arithmetic Computation with Constant Computational Overhead
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I,
2017, 10401
:223-254
[3]
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:291-308
[4]
Compressing Vector OLE
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:896-912
[5]
Buddhavarapu P, 2020, 2020599 CRYPT EPRINT
[6]
Private Set Intersection in the Internet Setting from Lightweight Oblivious PRF
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT III,
2020, 12172
:34-63
[7]
Combining Private Set-Intersection with Secure Two-Party Computation
[J].
SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018,
2018, 11035
:464-482
[8]
De Cristofaro E, 2010, LECT NOTES COMPUT SC, V6477, P213, DOI 10.1007/978-3-642-17373-8_13
[9]
De Cristofaro E, 2010, LECT NOTES COMPUT SC, V6052, P143, DOI 10.1007/978-3-642-14577-3_13
[10]
Demmler Daniel, 2018, Proceedings on Privacy Enhancing Technologies, V2018, P159, DOI 10.1515/popets-2018-0037