共 19 条
[1]
[Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]
[2]
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I,
2015, 9056
:673-701
[3]
Bendlin R, 2011, LECT NOTES COMPUT SC, V6632, P169, DOI 10.1007/978-3-642-20465-4_11
[4]
Bogdanov D, 2008, LECT NOTES COMPUT SC, V5283, P192
[5]
Universally composable security: A new paradigm for cryptographic protocols
[J].
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2001,
:136-145
[6]
Cramer R, 2003, LECT NOTES COMPUT SC, V2656, P596
[7]
Damgard Ivan, 2013, Computer Security - ESORICS 2013. 18th European Symposium on Research in Computer Security. Proceedings: LNCS 8134, P1, DOI 10.1007/978-3-642-40203-6_1
[8]
Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II,
2018, 10992
:799-829
[9]
Confidential Benchmarking Based on Multiparty Computation
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016,
2017, 9603
:169-187
[10]
Damgård I, 2012, LECT NOTES COMPUT SC, V7417, P643