Secure computation of randomized functions
暂无分享,去创建一个
[1] Manoj Prabhakaran,et al. Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation , 2009, IACR Cryptol. ePrint Arch..
[2] Ivan Damgård,et al. Secure Multiparty Computation and Secret Sharing , 2015 .
[3] Ye Wang,et al. On unconditionally secure multi-party sampling from scratch1 , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[4] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[5] Himanshu Tyagi,et al. When Is a Function Securely Computable? , 2010, IEEE Transactions on Information Theory.
[6] Joe Kilian. More general completeness theorems for secure two-party computation , 2000, STOC '00.
[7] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[8] Himanshu Tyagi. Distributed computing with privacy , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[9] Himanshu Tyagi,et al. Common randomness for secure computing , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[10] Imre Csiszár,et al. Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .
[11] Jack K. Wolf,et al. Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.
[12] Donald Beaver. Perfect Privacy For Two-Party Protocols , 1989, Distributed Computing And Cryptography.
[13] Noga Alon,et al. Source coding and graph entropies , 1996, IEEE Trans. Inf. Theory.
[14] Eyal Kushilevitz,et al. Privacy and communication complexity , 1989, 30th Annual Symposium on Foundations of Computer Science.
[15] Alon Orlitsky,et al. Coding for computing , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[16] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[17] Vinod M. Prabhakaran,et al. Communication and Randomness Lower Bounds for Secure Computation , 2015, IEEE Transactions on Information Theory.