On the structure of the privacy hierarchy
暂无分享,去创建一个
[1] Eyal Kushilevitz,et al. Privacy and communication complexity , 1989, 30th Annual Symposium on Foundations of Computer Science.
[2] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[3] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[4] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[5] Donald Beaver. Perfect Privacy For Two-Party Protocols , 1989, Distributed Computing And Cryptography.
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.
[7] Eyal Kushilevitz,et al. A zero-one law for Boolean privacy , 1989, STOC '89.
[8] Benny Chor,et al. The privacy of dense symmetric functions , 2005, computational complexity.
[9] Eyal Kushilevitz,et al. Private Computations over the Integers , 1995, SIAM J. Comput..
[10] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.