Hiding the Input-Size in Secure Two-Party Computation
暂无分享,去创建一个
[1] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[2] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[3] Yehuda Lindell,et al. Efficient Secure Two-Party Protocols , 2010, Information Security and Cryptography.
[4] Anat Paskin-Cherniavsky,et al. Evaluating Branching Programs on Encrypted Data , 2007, TCC.
[5] Ivan Visconti,et al. Secure Database Commitments and Universal Arguments of Quasi Knowledge , 2012, IACR Cryptol. ePrint Arch..
[6] Yehuda Lindell,et al. Efficient Secure Two-Party Protocols: Techniques and Constructions , 2010 .
[7] A. Razborov. Communication Complexity , 2011 .
[8] Silvio Micali,et al. Zero-knowledge sets , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..
[9] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[10] Silvio Micali,et al. Secure Computation (Abstract) , 1991, CRYPTO.
[11] Leonid A. Levin,et al. Fair Computation of General Functions in Presence of Immoral Majority , 1990, CRYPTO.
[12] N. Nisan. The communication complexity of threshold gates , 1993 .
[13] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[14] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[15] Eyal Kushilevitz,et al. Communication Complexity: Index of Notation , 1996 .
[16] Oded Goldreich. Foundations of Cryptography: Volume 1 , 2006 .
[17] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[18] Emiliano De Cristofaro,et al. (If) Size Matters: Size-Hiding Private Set Intersection , 2011, IACR Cryptol. ePrint Arch..
[19] Donald Beaver,et al. Foundations of Secure Interactive Computing , 1991, CRYPTO.