共 12 条
- [1] Beaver D, 1995, LECT NOTES COMPUT SC, V963, P97
- [2] Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
- [3] Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
- [4] Crepeau C, 1994, LNCS, V773, P319, DOI DOI 10.1007/3-540-48329-2_27
- [5] Comparing information without leaking it [J]. COMMUNICATIONS OF THE ACM, 1996, 39 (05) : 77 - 85
- [6] FISCHER MJ, 1992, LECT NOTES COMPUT SC, V576, P141
- [7] Goldreich O., P 19 ANN ACM S THEOR, P218, DOI [10.1145/28395.28420, DOI 10.1145/28395.28420]
- [9] Naor M., 1995, LECT NOTES COMPUTER, P1, DOI DOI 10.1007/BFB0053419
- [10] NAOR M, APPL KID CRYPTOGRAPH