共 32 条
[11]
Bellare M, 2013, LECT NOTES COMPUT SC, V8043, P398, DOI 10.1007/978-3-642-40084-1_23
[12]
Bellare M, 2012, LECT NOTES COMPUT SC, V7658, P134, DOI 10.1007/978-3-642-34961-4_10
[13]
Boneh D, 2014, LECT NOTES COMPUT SC, V8441, P533, DOI 10.1007/978-3-642-55220-5_30
[14]
Function Secret Sharing
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II,
2015, 9057
:337-367
[15]
Garay JA, 2009, LECT NOTES COMPUT SC, V5677, P505, DOI 10.1007/978-3-642-03356-8_30
[16]
Gennaro R, 2010, LECT NOTES COMPUT SC, V6223, P465, DOI 10.1007/978-3-642-14623-7_25
[17]
Gilboa N, 2014, LECT NOTES COMPUT SC, V8441, P640, DOI 10.1007/978-3-642-55220-5_35
[18]
Goldreich O., 1984, CRYPTO 1984, V196, P276, DOI DOI 10.1007/3-540-39568-722
[19]
Goldwasser S, 2008, LECT NOTES COMPUT SC, V5157, P39, DOI 10.1007/978-3-540-85174-5_3
[20]
Goldwasser S, 2013, STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, P555