One-Time Tables for Two-Party Computation
暂无分享,去创建一个
[1] J. Feigenbaum. Advances in cryptology--CRYPTO '91 : proceedings , 1992 .
[2] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[3] Donald Beaver,et al. Commodity-based cryptography (extended abstract) , 1997, STOC '97.
[4] Andrew Chi-Chih Yao,et al. Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[5] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.
[7] Jeroen van de Graaf,et al. Committed Oblivious Transfer and Private Multi-Party Computation , 1995, CRYPTO.
[8] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[9] H. C. Williams,et al. Advances in Cryptology — CRYPTO ’85 Proceedings , 2000, Lecture Notes in Computer Science.
[10] Judit Bar-Ilan,et al. Non-cryptographic fault-tolerant computing in constant number of rounds of interaction , 1989, PODC '89.
[11] Andrew M. Odlyzko,et al. Advances in cryptology -- CRYPTO '86 : proceedings , 1987 .
[12] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[13] Allen H. Levesque,et al. Error-control techniques for digital communication , 1985 .
[14] Richard Cleve,et al. Limits on the security of coin flips when half the processors are faulty , 1986, STOC '86.
[15] Carl Pomerance. Advances in cryptology -- CRYPTO '87 : proceedings , 1988 .
[16] Donald Beaver,et al. Efficient Multiparty Protocols Using Circuit Randomization , 1991, CRYPTO.
[17] Donald Beaver,et al. Precomputing Oblivious Transfer , 1995, CRYPTO.
[18] Andrew Chi-Chih Yao,et al. Theory and Applications of Trapdoor Functions (Extended Abstract) , 1982, FOCS.
[19] Martin Tompa,et al. How to Share a Secret with Cheaters , 1986, CRYPTO.