Private computations over the integers
暂无分享,去创建一个
[1] Donald Beaver. Perfect Privacy For Two-Party Protocols , 1989, Distributed Computing And Cryptography.
[2] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[3] Eyal Kushilevitz,et al. Privacy and communication complexity , 1989, 30th Annual Symposium on Foundations of Computer Science.
[4] Judit Bar-Ilan,et al. Non-cryptographic fault-tolerant computing in constant number of rounds of interaction , 1989, PODC '89.
[5] Eyal Kushilevitz,et al. A zero-one law for Boolean privacy , 1989, STOC '89.
[6] Richard J. Lipton,et al. Multi-party protocols , 1983, STOC.
[7] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[8] Prasoon Tiwari,et al. Lower bounds on communication complexity in distributed computer networks , 1984, JACM.
[9] Joseph Y. Halpern,et al. Knowledge and common knowledge in a distributed environment , 1984, JACM.
[10] Andrew Chi-Chih Yao,et al. Some complexity questions related to distributive computing(Preliminary Report) , 1979, STOC.
[11] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[12] Eyal Kushilevitz,et al. Secret Sharing Over Infinite Domains (Extended Abstract) , 1989, CRYPTO.
[13] G. R. Blakley,et al. Security Proofs for Information Protection Systems , 1981, 1981 IEEE Symposium on Security and Privacy.