The Security Matrix Factorization Agreement with Two Parties
暂无分享,去创建一个
[1] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[2] Silvio Micali,et al. Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.
[3] Wenliang Du,et al. Privacy-preserving cooperative scientific computations , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[4] Moni Naor,et al. Oblivious Transfer with Adaptive Queries , 1999, CRYPTO.
[5] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[6] Luo Wen. The Secure Multi-Party Protocol of Matrix Product and Its Application , 2005 .
[7] Niv Gilboa,et al. Computationally private information retrieval (extended abstract) , 1997, STOC '97.
[8] Wenliang Du,et al. A study of several specific secure two-party computation problems , 2001 .
[9] Yehuda Lindell. Composition of Secure Multi-Party Protocols , 2003, Lecture Notes in Computer Science.
[10] Moni Naor,et al. Distributed Oblivious Transfer , 2000, ASIACRYPT.
[11] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.