共 38 条
- [1] Secure Arithmetic Computation with Constant Computational Overhead [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 : 223 - 254
- [3] Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 291 - 308
- [4] Compressing Vector OLE [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 896 - 912
- [5] Buddhavarapu P., 2020, Report 2020/599, V2020, P599
- [6] Chase Melissa, 2020, Advances in Cryptology - CRYPTO 2020. 40th Annual International Cryptology Conference, CRYPTO 2020. Proceedings. Lecture Notes in Computer Science (LNCS 12172), P34, DOI 10.1007/978-3-030-56877-1_2
- [7] Chen Y H, 2012, NDSS, P23
- [8] Combining Private Set-Intersection with Secure Two-Party Computation [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 464 - 482
- [9] De Cristofaro E, 2010, LECT NOTES COMPUT SC, V6477, P213, DOI 10.1007/978-3-642-17373-8_13
- [10] De Cristofaro E, 2010, LECT NOTES COMPUT SC, V6052, P143, DOI 10.1007/978-3-642-14577-3_13