How to simultaneously exchange a secret bit by flipping a symmetrically-biased coin
暂无分享,去创建一个
[1] Tom Tedrick,et al. How to Exchange Half a Bit , 1983, CRYPTO.
[2] Andrew Chi-Chih Yao,et al. Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[3] Gilles Brassard,et al. On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys , 1982, CRYPTO.
[4] Leonard M. Adleman,et al. On distinguishing prime numbers from composite numbers , 1980, 21st Annual Symposium on Foundations of Computer Science (sfcs 1980).
[5] L. Adleman,et al. On distinguishing prime numbers from composite numbers , 1980, 21st Annual Symposium on Foundations of Computer Science (sfcs 1980).
[6] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[7] Joseph Y. Halpern,et al. A logic to reason about likelihood , 1983, Artif. Intell..
[8] Manuel Blum. How to exchange (secret) keys , 1983, STOC '83.