Wiretap codes for secure multi-party computation
暂无分享,去创建一个
[1] Alexander Vardy,et al. Achieving the secrecy capacity of wiretap channels using Polar codes , 2010, ISIT.
[2] Mikael Skoglund,et al. Nested Polar Codes for Wiretap and Relay Channels , 2010, IEEE Communications Letters.
[3] Alexander Vardy,et al. A new polar coding scheme for strong security on wiretap channels , 2013, 2013 IEEE International Symposium on Information Theory.
[4] Mauro Barni,et al. Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.
[5] Fernando Pérez-González,et al. Privacy-preserving data aggregation in smart metering systems: an overview , 2013, IEEE Signal Processing Magazine.
[6] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[7] Emina Soljanin,et al. Secure Network Coding for Wiretap Networks of Type II , 2009, IEEE Transactions on Information Theory.
[8] Satoshi Obana. Almost Optimum t-Cheater Identifiable Secret Sharing Schemes , 2011, EUROCRYPT.
[9] Adi Shamir,et al. How to share a secret , 1979, CACM.
[10] Steven W. McLaughlin,et al. MDS codes on the erasure-erasure wiretap channel , 2009, ArXiv.
[11] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[12] Rafail Ostrovsky,et al. Unconditionally-Secure Robust Secret Sharing with Compact Shares , 2012, EUROCRYPT.
[13] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[14] Tsuyoshi Takagi,et al. On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary , 2013, IWSEC.