[1] |
YAO A . Protocols for secure computations[A]. Proc 23rd IEEE Symp On the Foundation of Computer Science[C]. 1982. 160-164.
|
[2] |
CLEVE R . Limits on the security of coin flips when half the processors are faulty[A]. 18th STOC[C]. 1986. 364-369.
|
[3] |
DOV GORDON S , HAZAY C , KATZ J . Complete fairness in secure two-party computation[A]. STOC'08[C]. 2008. 17-26.
|
[4] |
BONEH D , NAOR M . Timed commitments[A]. Crypto 2000[C]. 2000. 236-254.
|
[5] |
ASOKAN N , SCHUNTER M , WAIDNER M . Optimistic protocols for fair exchange[A]. CCS[C].ACM, 1997. 7-17.
|
[6] |
KATZ J . On achieving the “best of both worlds” in secure multiparty computation[A]. STOC[C]. 2007. 11-20.
|
[7] |
DOV GORDON S , KATZ J . Partial fairness in secure two-party computation[A]. EUROCRYPT 2010[C]. Springer-Verlag 2010. 157-176.
|
[8] |
BENOR M , GOLDWASSER S , WIGDERSON A . Completeness theorems for noncryptographic fault-tolerant distributed computation (extended abstract)[A]. STOC1988[C].ACM. 1988. 1-10.
|
[9] |
CHAUM D , CCREPEAU S , DAMGARD I . Multiparty unconditionally secure protocols (extended abstract)[A]. STOC1988[C].ACM. 1988. 1-19.
|
[10] |
RABIN T , BENNOR M . Verifiable secret sharing and multiparty protocols with honest majority (extended abstract)[A]. STOC1989[C].ACM. 1989. 73-85.
|
[11] |
DOV GORDON S , ISHAI T , MORAN T , OSTROVSKY R et al. On complete primitives for fairness[J]. TCC2010 IEEE[C]. 2010. 91-108.
|
[12] |
CANETTI R et al. Universally composable security: a new paradigm for cryptographic protocols[J]. a revised version (2005) is available at IACR eprint archive[EB/OL]. .
|
[13] |
ZHANG F , MA J F , MOON S J . Universally composable anonymous Hash certification model[J]. Sci China Inf Sci, 2007. 440-445.
|
[14] |
FENG T , LI F H , MA J F et al. A new approach for UC security concurrent deniable authentication[J]. Sci China Inf Sci, 2008,51 352-367.
|
[15] |
ZHANG J W , MA J F , MOON S J . Universally composable secure TNC model and EAP-TNC protocol in IF-T[J]. Sci China Inf Sci, 2010,53 465-482.
|
[16] |
ZHANG J W , MA J F , MOON S J . Universally composable one-time signature and broadcast authentication[J]. Sci China Inf Sci, 2010,53 567-580.
|
[17] |
田有亮, 马建峰, 彭长根 等. 群组通信的通用可组合机制[J]. 计算机学报, 2012,35(4): 645-653. TIAN Y L , MA J F , PENG C G et al. Universally composable mecha-nism for group communication[J]. Chinese Journal of Computers, 2012,35(4): 645-653.
|
[18] |
张妤, 胡杰 . UC安全计算的一种信任模型[J]. 四川大学学报(工程科学版), 2012,44(3): 106-111. ZHANG Y , HU J . A trust model of UC secure computation[J]. Journal of Sichuan University(Engineering Science Edition), 2012,44(3): 106-111.
|
[19] |
BONEH D , FRANKLIN M . Identity based encryption from the weil pairing[J]. SIAM J of computing, Extended Abstract in Crypto, 2003,32(3): 586-615.
|