共 15 条
- [1] Balogh J.(2003)Private computation using a PEZ dispenser Theor. Comp. Sci. 306 69-84
- [2] Csirik J.A.(1996)Comparing information without leaking it Commun. ACM 39 77-85
- [3] Ishai Y.(1991)Proofs that yield nothing but their validity, and a methodology of cryptographic protocol design J. Assoc. Comput. Mach. 38 691-729
- [4] Kushilevitz E.(1989)The knowledge complexity of interactive proof systems SIAM J. Comput. 18 186-208
- [5] Fagin R.(2006)Unwed numbers Am. Sci. 94 12-15
- [6] Naor M.(1991)Bit commitment using pseudo-randomness J. Cryptol. 4 151-158
- [7] Winkler P.(undefined)undefined undefined undefined undefined-undefined
- [8] Goldreich O.(undefined)undefined undefined undefined undefined-undefined
- [9] Micali S.(undefined)undefined undefined undefined undefined-undefined
- [10] Wigderson A.(undefined)undefined undefined undefined undefined-undefined