共 8 条
[1]
A new andefficient fail-stop signature scheme. SUSILO W,SAFAVI R,GYSIN M,et al. Computer Journal . 2000
[2]
Secure multi-partycomputation problems and their applications:a reviewand open problems. DU Wenliang,ATALLAH M J. Proceedings of New SecurityParadigms Workshop . 2001
[3]
Protocols for secure computations. YAO A C. Proceedings of the 23th IEEE Symposium on Founda-tions of Computer Science . 1982
[4]
Multi-party computations:pastand present. GOLDWASSER S. Proceedings of the 16th AnnualACM Symposium on Principles of Distributed Compu-ting . 1997
[5]
Foundations of cryptography:basicapplications. GOLDREICH O. . 2004
[6]
Introduction to se-cure multi-party computations. CRAMER R,DAMGAARDL I. http:∥homepages.cwi.nl∧~cramer/ . 2005
[7]
Howto play ANY mental game. GOLDREICH O,MICALI S,WIGDERSON A. Proceedings of the19th Annual ACM Conference on Theory of Compu-ting . 1987
[8]
Applied cryptography,protocol,algo-rithm and source code in C. SCHNEIER B. . 1996