共 18 条
[1]
BEAVER D, 1992, LECT NOTES COMPUT SC, V576, P377
[2]
Ben-Or Michael, 1988, P 20 ANN ACM S THEOR, P1, DOI DOI 10.1145/62212.62213
[3]
Canetti R., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P19
[4]
Universally composable security: A new paradigm for cryptographic protocols
[J].
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2001,
:136-145
[5]
Canetti R, 2003, LECT NOTES COMPUT SC, V2656, P68
[7]
Canetti R., 2002, P 34 ANN ACM S THEOR, P494
[8]
Canetti Ran, 2001, Proc. 33rd Annual ACM Symposium on Theory of Computing, P570, DOI 10.1145/380752.380852
[9]
Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
[10]
Dwork C., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P409, DOI 10.1145/276698.276853