All Complete Functionalities are Reversible
暂无分享,去创建一个
[1] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[2] Amit Sahai,et al. A Full Characterization of Completeness for Two-Party Randomized Function Evaluation , 2014, EUROCRYPT.
[3] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[4] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[5] Silvio Micali,et al. The All-or-Nothing Nature of Two-Party Secure Computation , 1999, CRYPTO.
[6] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[7] Joe Kilian,et al. A general completeness theorem for two party games , 1991, STOC '91.
[8] Yehuda Lindell,et al. Universally composable two-party and multi-party secure computation , 2002, STOC '02.
[9] Kirill Morozov,et al. Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel , 2004, SCN.
[10] Rudolf Ahlswede,et al. Founding Cryptography on Oblivious Transfer , 2016 .
[11] Gilles Brassard,et al. Information theoretic reductions among disclosure problems , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[12] Oded Goldreich,et al. How to Solve any Protocol Problem - An Efficiency Improvement , 1987, CRYPTO.
[13] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[14] Joe Kilian,et al. Achieving Oblivious Transfer Using Weakened Security Assumptions (Extended Abstract) , 1988, FOCS 1988.
[15] Manoj Prabhakaran,et al. A Unified Characterization of Completeness and Triviality for Secure Function Evaluation , 2012, INDOCRYPT.
[16] Joe Kilian. More general completeness theorems for secure two-party computation , 2000, STOC '00.
[17] Yuval Ishai,et al. Founding Cryptography on Oblivious Transfer - Efficiently , 2008, CRYPTO.
[18] Andrew Y. Lindell. Adaptively Secure Two-Party Computation with Erasures , 2009, CT-RSA.
[19] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[20] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[21] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[22] Jörn Müller-Quade,et al. Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions , 2010, TCC.
[23] Joe Kilian,et al. Achieving oblivious transfer using weakened security assumptions , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[24] Miklos Santha,et al. On the Reversibility of Oblivious Transfer , 1991, EUROCRYPT.
[25] Stefan Wolf,et al. Oblivious Transfer Is Symmetric , 2006, EUROCRYPT.