Key Technologies and Applications of Secure Multiparty Computation
暂无分享,去创建一个
Ying Li | Shuai Zhang | Xiaoqiang Guo | X. Guo | Shuaifeng Zhang | Ying Li
[1] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[2] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[3] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[4] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[5] Leonid A. Levin,et al. Fair Computation of General Functions in Presence of Immoral Majority , 1990, CRYPTO.
[6] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[7] Berry Schoenmakers,et al. A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic , 1999, CRYPTO.
[8] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[9] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[10] Donald Beaver,et al. Foundations of Secure Interactive Computing , 1991, CRYPTO.
[11] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[12] Rafail Ostrovsky,et al. How To Withstand Mobile Virus Attacks , 1991, PODC 1991.
[13] Nathan Linial,et al. Fault-tolerant computation in the full information model , 1991, [1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science.
[14] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[15] Josh Benaloh,et al. Dense Probabilistic Encryption , 1999 .
[16] Markus Stadler,et al. Publicly Verifiable Secret Sharing , 1996, EUROCRYPT.
[17] Christian Cachin,et al. Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.