Author:
Tian Yuan,Tian Xinke,Pang Yongda
Publisher
Springer Nature Switzerland
Reference24 articles.
1. Damagard, I., Cramer, R., Nielsen, J.B.: Secure Multiparty Computation and Secret Sharing. Cambridge University Press, Cambridge (2015)
2. Furukawa, J., Lindell, Y.: Two-thirds honest-majority MPC for malicious adversaries at Almost the Cost of Semi-Honest. In: 26th ACM CCS, pp. 1557–1571 (2019)
3. Kosba, A., Papamanthou, C., Shi, E.: xJsnark: a framework for efficient verifiable computation. IEEE Symposium on Privacy and Security, pp. 128–149 (2018)
4. Cecchetti, E., Zhang, F., Ji, Y., Kosba, A., Juels, A., Shi, E.: Solidus: Confidential Distributed Ledger Transactions via PVORM, pp. 701–718. ACM Computer and Communication Security, Dalas (2017)
5. Bünz, B., Fisch, B., Szepieniec, A.: Transparent SNARKs from DARK compilers. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020. LNCS, vol. 12105, pp. 677–706. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-45721-1_24