共 21 条
[2]
Beaver D, 1995, LECT NOTES COMPUT SC, V963, P97
[3]
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[5]
Blundo C, 1999, LECT NOTES COMPUT SC, V1693, P138
[6]
Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
[9]
On the Communication Required for Unconditionally Secure Multiplication
[J].
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II,
2016, 9815
:459-488
[10]
Unconditionally Secure Computation with Reduced Interaction
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II,
2016, 9666
:420-447