共 49 条
[1]
[Anonymous], 1984, 3 ACM PODC
[2]
[Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]
[3]
Asharov G, 2012, LECT NOTES COMPUT SC, V7237, P483, DOI 10.1007/978-3-642-29011-4_29
[4]
Asharov Gilad., 2011, ELECT C COMPUTATIONA, V18, P36
[5]
BEAVER D, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P503, DOI 10.1145/100216.100287
[7]
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[8]
Ben-Or M., 1983, 2 ACM PODC, P27
[9]
Cachin C., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P524
[10]
Universally composable security: A new paradigm for cryptographic protocols
[J].
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2001,
:136-145