共 50 条
- [1] Ad Hoc PSM Protocols: Secure Computation Without Coordination ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III, 2017, 10212 : 580 - 608
- [2] Secure Two-Party Computation: A Visual Way INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 18 - 38
- [3] Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation IEEE ACCESS, 2025, 13 : 9015 - 9031
- [4] Privacy preserving data mining algorithms without the use of secure computation or perturbation 10TH INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2006, : 121 - 128
- [7] Circuits Resilient to Additive Attacks with Applications to Secure Computation STOC'14: PROCEEDINGS OF THE 46TH ANNUAL 2014 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2014, : 495 - 5047
- [8] Zero-Knowledge from Secure Multiparty Computation STOC 07: PROCEEDINGS OF THE 39TH ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, 2007, : 21 - 30
- [9] Complete Fairness in Secure Two-Party Computation STOC'08: PROCEEDINGS OF THE 2008 ACM INTERNATIONAL SYMPOSIUM ON THEORY OF COMPUTING, 2008, : 413 - +