Secure Games with Polynomial Expressions
暂无分享,去创建一个
[1] A. Yao. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[2] Shafi Goldwasser,et al. Multi party computations: past and present , 1997, PODC '97.
[3] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometric codes , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[4] Silvio Micali,et al. Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.
[5] Niv Gilboa,et al. Computationally private information retrieval (extended abstract) , 1997, STOC '97.
[6] Phong Q. Nguyen,et al. Noisy Polynomial Interpolation and Noisy Chinese Remaindering , 2000, EUROCRYPT.
[7] Joe Kilian,et al. Uses of randomness in algorithms and protocols , 1990 .
[8] Ronitt Rubinfeld,et al. Learning polynomials with queries: The highly noisy case , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[9] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[10] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[11] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography (A Short Survey) , 2001 .
[12] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[13] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[14] Madhu Sudan,et al. Decoding of Reed Solomon Codes beyond the Error-Correction Bound , 1997, J. Complex..
[15] O. Antoine,et al. Theory of Error-correcting Codes , 2022 .
[16] Elwyn R. Berlekamp,et al. Algebraic coding theory , 1984, McGraw-Hill series in systems science.
[17] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[18] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.