Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion
暂无分享,去创建一个
[1] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[2] Satoshi Obana,et al. An Efficient Construction of Non-Interactive Secure Multiparty Computation , 2016, CANS.
[3] Moni Naor,et al. A minimal model for secure computation (extended abstract) , 1994, STOC '94.
[4] Yuval Ishai,et al. Private simultaneous messages protocols with applications , 1997, Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems.
[5] Anat Paskin-Cherniavsky,et al. Non-Interactive Secure Multiparty Computation , 2014, IACR Cryptol. ePrint Arch..
[6] Amit Sahai,et al. Multi-Input Functional Encryption , 2014, IACR Cryptol. ePrint Arch..
[7] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[8] David A. Mix Barrington,et al. Bounded-width polynomial-size branching programs recognize exactly those languages in NC1 , 1986, STOC '86.
[9] Yuval Ishai,et al. Secure Multiparty Computation with General Interaction Patterns , 2016, IACR Cryptol. ePrint Arch..
[10] Yehuda Lindell,et al. Secure Computation on the Web: Computing without Simultaneous Interaction , 2011, IACR Cryptol. ePrint Arch..
[11] Guy N. Rothblum,et al. On Best-Possible Obfuscation , 2007, TCC.
[12] Satoshi Obana,et al. On the (In)Efficiency of Non-Interactive Secure Multiparty Computation , 2015, ICISC.
[13] Avi Wigderson,et al. On span programs , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.
[14] Yuval Ishai,et al. Founding Cryptography on Oblivious Transfer - Efficiently , 2008, CRYPTO.
[15] Yuval Ishai,et al. Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials , 2002, ICALP.
[16] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[17] J. Pintz,et al. The Difference Between Consecutive Primes, II , 2001 .