共 41 条
[1]
How to Efficiently Evaluate RAM Programs with Malicious Security
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I,
2015, 9056
:702-729
[2]
[Anonymous], 2004, FDN CRYPTOGRAPHY BAS
[3]
[Anonymous], 1987, P 19 ANN ACM S THEOR, DOI DOI 10.1145/28395.28420
[4]
Ben-Efraim Aner, 2017, Advances in Cryptology - ASIACRYPT 2017. 23rd International Conference on the Theory and Applications of Cryptology and Information Security. Proceedings: LNCS 10625, P471, DOI 10.1007/978-3-319-70697-9_17
[5]
Ben-Efraim A., 2016, OPTIMIZING SEMIHONES, P578
[6]
Function Secret Sharing: Improvements and Extensions
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:1292-1303
[7]
Function Secret Sharing
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II,
2015, 9057
:337-367
[8]
Fully Succinct Garbled RAM
[J].
ITCS'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INNOVATIONS IN THEORETICAL COMPUTER SCIENCE,
2016,
:169-178
[9]
Damgård I, 2012, LECT NOTES COMPUT SC, V7417, P643
[10]
DOERNER J., 2017, CCS