共 65 条
[1]
Ananth P., 2015, IACR CRYPTOLOGY EPRI, V2015, P1023
[2]
Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II,
2017, 10402
:252-279
[3]
Delegating RAM Computations with Adaptive Soundness and Privacy
[J].
THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II,
2016, 9986
:3-30
[4]
[Anonymous], 2012, ITCS, DOI 10.1145/ 2090236.2090263
[5]
Cryptography in NC0
[J].
45TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2004,
:166-175
[7]
Applebaum B, 2014, LECT NOTES COMPUT SC, V8874, P162, DOI 10.1007/978-3-662-45608-8_9
[8]
How to Garble Arithmetic Circuits
[J].
2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011),
2011,
:120-129
[9]
Applebaum B, 2011, LECT NOTES COMPUT SC, V6673, P25, DOI 10.1007/978-3-642-20728-0_3
[10]
Applebaum B, 2011, LECT NOTES COMPUT SC, V6632, P527, DOI 10.1007/978-3-642-20465-4_29