Secure computation of randomized functions: Further results
暂无分享,去创建一个
[1] Manoj Prabhakaran,et al. Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation , 2009, IACR Cryptol. ePrint Arch..
[2] Aaron D. Wyner,et al. The common information of two dependent random variables , 1975, IEEE Trans. Inf. Theory.
[3] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[4] Ye Wang,et al. On unconditionally secure multi-party sampling from scratch1 , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[5] Donald Beaver. Perfect Privacy For Two-Party Protocols , 1989, Distributed Computing And Cryptography.
[6] Amin Gohari,et al. Channel Simulation via Interactive Communications , 2012, IEEE Transactions on Information Theory.
[7] Imre Csiszár,et al. Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .
[8] Manoj Prabhakaran,et al. Towards Characterizing Securely Computable Two-Party Randomized Functions , 2018, Public Key Cryptography.
[9] Amin Gohari,et al. Achievability Proof via Output Statistics of Random Binning , 2014, IEEE Trans. Inf. Theory.
[10] Joe Kilian. More general completeness theorems for secure two-party computation , 2000, STOC '00.
[11] Himanshu Tyagi,et al. Common randomness for secure computing , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[12] Eyal Kushilevitz,et al. Privacy and communication complexity , 1989, 30th Annual Symposium on Foundations of Computer Science.
[13] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[14] Alon Orlitsky,et al. Coding for computing , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[15] Abbas El Gamal,et al. Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).
[16] Paul W. Cuff,et al. Distributed Channel Synthesis , 2012, IEEE Transactions on Information Theory.
[17] Deepesh Data. Secure computation of randomized functions , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[18] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[19] Himanshu Tyagi,et al. When Is a Function Securely Computable? , 2010, IEEE Transactions on Information Theory.