共 41 条
- [1] BARILAN J, 1994, P ACM S PRINC DISTR, P201
- [2] BEAVER D, 1992, LECT NOTES COMPUT SC, V576, P377
- [3] BEAVER D, 1987, TR1287 HARV U
- [4] Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
- [5] Boyd C., 1986, CRYPTOGRAPHY CODING, P241
- [6] CANETTI R, 1999, LNCS, V1666, P98
- [7] CERECEDO M, 1993, IEICE T FUND ELECTR, VE76A, P532
- [8] Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
- [9] CROFT RA, 1989, CRYPTOGRAPHY CODING, P189
- [10] de Santis A., 1994, Proceedings of the Twenty-Sixth Annual ACM Symposium on the Theory of Computing, P522, DOI 10.1145/195058.195405