共 69 条
[2]
Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters
[J].
INFORMATION THEORETIC SECURITY, ICITS 2016,
2016, 10015
:3-23
[3]
Agarwal S, 2006, LECT NOTES COMPUT SC, V4117, P394
[4]
[Anonymous], 1987, P ACM S THEOR COMP, DOI DOI 10.1145/28395.28420
[5]
Bancal JD, 2021, Arxiv, DOI arXiv:1812.09117
[6]
Barz S, 2013, NAT PHYS, V9, P727, DOI [10.1038/NPHYS2763, 10.1038/nphys2763]
[8]
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[10]
Universal Blind Quantum Computation
[J].
2009 50TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE: FOCS 2009, PROCEEDINGS,
2009,
:517-526