共 26 条
[1]
[Anonymous], 2004, FDN CRYPTOGRAPHY BAS
[2]
[Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]
[3]
ARAKI T, 2017, IEEE S P
[4]
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:805-817
[5]
BEAVER D, 1992, LECT NOTES COMPUT SC, V576, P377
[6]
Beerliová-Trubíniová Z, 2008, LECT NOTES COMPUT SC, V4948, P213, DOI 10.1007/978-3-540-78524-8_13
[7]
BENOR M, 1988, 20 STOC
[8]
Burra S.S., 2015, 2015472 EPRINT CRYPT, V2015, P472
[10]
Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214