共 38 条
[1]
[Anonymous], 1987, P 19 ANN ACM S THEOR, DOI DOI 10.1145/28395.28420
[2]
[Anonymous], 1978, FDN SEC COMPUT
[3]
Computationally private randomizing polynomials and their applications
[J].
TWENTIETH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY, PROCEEDINGS,
2005,
:260-274
[4]
Asharov G, 2012, LECT NOTES COMPUT SC, V7237, P483, DOI 10.1007/978-3-642-29011-4_29
[5]
BEAVER D, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P503, DOI 10.1145/100216.100287
[6]
Boneh D, 2008, LECT NOTES COMPUT SC, V5157, P108, DOI 10.1007/978-3-540-85174-5_7
[7]
Boneh D, 2013, LECT NOTES COMPUT SC, V8270, P280, DOI 10.1007/978-3-642-42045-0_15
[9]
Breaking the Circuit Size Barrier for Secure Computation Under DDH
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I,
2016, 9814
:509-539
[10]
Function Secret Sharing
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II,
2015, 9057
:337-367