Information-Theoretically Secure Number-Product Protocol
暂无分享,去创建一个
[1] M. Degroot,et al. Probability and Statistics , 2021, Examining an Operational Approach to Teaching Probability.
[2] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[3] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[4] Walter L. Smith. Probability and Statistics , 1959, Nature.
[5] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.
[7] Donald Beaver,et al. Commodity-based cryptography (extended abstract) , 1997, STOC '97.
[8] Wenliang Du,et al. A study of several specific secure two-party computation problems , 2001 .
[9] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[10] Justin Zhijun Zhan,et al. Privacy-preserving collaborative data mining , 2007, IEEE Computational Intelligence Magazine.
[11] Yi-Ting Chiang,et al. Secrecy of Two-Party Secure Computation , 2005, DBSec.
[12] Yi-Ting Chiang,et al. Information Theoretical Analysis of Two-Party Secret Computation , 2006, DBSec.