共 24 条
[1]
BEAVER D, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P503, DOI 10.1145/100216.100287
[2]
Beaver D., 1991, Journal of Cryptology, V4, P75, DOI 10.1007/BF00196771
[3]
BEAVER D, 1991, LECT NOTES COMPUTER, V576, P377
[4]
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[5]
Canetti R., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P639, DOI 10.1145/237814.238015
[6]
CANETTI R, 1994, LECT NOTES COMPUTER, V839, P425
[7]
Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
[9]
Chor B., 1985, P 26 IEEE S FDN COMP, P383
[10]
DESMEDT Y, 1989, LECT NOTES COMPUTER, V435, P307