Secure Multiparty Computation
暂无分享,去创建一个
[1] Ueli Maurer. Secure multi-party computation made simple , 2006, Discret. Appl. Math..
[2] R. Cramer,et al. Multiparty Computation, an Introduction , 2005 .
[3] Yehuda Lindell,et al. Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries , 2007, Journal of Cryptology.
[4] Arpita Patra,et al. Studies on Verifiable Secret Sharing, Byzantine Agreement and Multiparty Computation , 2010, IACR Cryptol. ePrint Arch..
[5] Wenliang Du,et al. Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.
[6] Manuel Blum,et al. Non-interactive zero-knowledge and its applications , 1988, STOC '88.
[7] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[8] Moti Yung,et al. Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model , 1987, CRYPTO.
[9] Adi Shamir,et al. How to share a secret , 1979, CACM.