Communication requirements for secure computation
暂无分享,去创建一个
[1] Alon Orlitsky,et al. Coding for computing , 2001, IEEE Trans. Inf. Theory.
[2] Stefan Wolf,et al. New Monotones and Lower Bounds in Unconditional Two-Party Computation , 2008, IEEE Transactions on Information Theory.
[3] Siu-Wai Ho,et al. Error-free perfect-secrecy systems , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[4] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[5] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[6] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[7] Joe Kilian. More general completeness theorems for secure two-party computation , 2000, STOC '00.
[8] Manuel Blum,et al. How to exchange (secret) keys , 1983, TOCS.
[9] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[10] Andrew Chi-Chih Yao,et al. Some complexity questions related to distributive computing(Preliminary Report) , 1979, STOC.
[11] A. Razborov. Communication Complexity , 2011 .
[12] Joe Kilian,et al. Achieving oblivious transfer using weakened security assumptions , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[13] Vinod M. Prabhakaran,et al. On the Communication Complexity of Secure Computation , 2013, IACR Cryptol. ePrint Arch..
[14] Vinod M. Prabhakaran,et al. Assisted Common Information With an Application to Secure Two-Party Sampling , 2014, IEEE Transactions on Information Theory.