One-Round Secure Multiparty Computation of Arithmetic Streams and Functions - (Extended Abstract)
暂无分享,去创建一个
[1] Craig Gentry,et al. Fully Homomorphic Encryption with Polylog Overhead , 2012, EUROCRYPT.
[2] Eike Kiltz,et al. Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation , 2006, IACR Cryptol. ePrint Arch..
[3] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[4] Silvio Micali,et al. The round complexity of secure protocols , 1990, STOC '90.
[5] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[6] Frederik Vercauteren,et al. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.
[7] Shlomi Dolev,et al. Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation , 2014, IACR Cryptol. ePrint Arch..
[8] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[9] Adi Shamir,et al. How to share a secret , 1979, CACM.
[10] Yin Li,et al. Secret Shared Random Access Machine , 2015, ALGOCLOUD.
[11] Yuval Ishai,et al. Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography , 2010, IACR Cryptol. ePrint Arch..
[12] Zvika Brakerski,et al. Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts , 2016, CRYPTO.
[13] Yuval Ishai,et al. On 2-Round Secure Multiparty Computation , 2002, CRYPTO.
[14] Yuval Ishai,et al. Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials , 2002, ICALP.
[15] Moti Yung,et al. Secret Swarm UnitReactive k-Secret Sharing , 2007, INDOCRYPT.
[16] Judit Bar-Ilan,et al. Non-cryptographic fault-tolerant computing in constant number of rounds of interaction , 1989, PODC '89.
[17] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[18] Eyal Kushilevitz,et al. Communication Complexity , 1997, Adv. Comput..
[19] Shlomi Dolev,et al. Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation: Extended Abstract , 2015, IACR Cryptol. ePrint Arch..
[20] Fucai Zhou,et al. Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures , 2018, J. Netw. Comput. Appl..