[1] YAO A C.Protocols for secure computations[A].Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science[C].Chicago:IEEE,1982.160-164.
[2] GOLDREICH O,MICALI S,WIGDERSON A.How to play any mental game[A].Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing[C].New York:ACM,1987.218-229.
[3] GOLDREIH O.Foundations of Cryptography:Volume 2,Basic Applications[M].London:Cambridge University Press,2004.599-764.
[4] 李顺东,王道顺.基于同态加密的高效多方保密计算[J].电子学报,2013,41(4):798-803. LI Shun-dong,WANG Dao-shun.Efficient secure multiparty computation based on homomorphic encryption[J].Acta Electronica Sinica,2013,41(4):798-803.(in Chinese)
[5] GRIGORIEV D,SHPILRAIN V.Yao's millionaires' problem and decoy-based public key encryption by classical physics[J].International Journal of Foundations of Computer Science,2014,25(04):409-417.
[6] LI S D,GUO Y M,ZHOU S F,et al.Efficient protocols for the general millionaires' problem[J].Chinese Journal of Electronics,2017,26(4):696-702.
[7] YANG X Y,LI S D,Zuo X J.Secure multi-party geometry computation[J].Journal of Cryptologic Research,2016,3(1):33-41.
[8] 罗永龙,黄刘生,徐维江,等.一个保护私有信息的多边形相交判定协议[J].电子学报,2007,35(4):685-691. LUO Yong-long,HUANG Liu-sheng,XU Wei-jiang,et al.A protocol for privacy preserving intersect determination of two polygons[J].Acta Electronica Sinica,2007,35(4):685-691.(in Chinese)
[9] 李顺东,杨晓莉,左祥建,等.保护私有信息的图形相似判定[J].电子学报,2017,45(9):2184-2189. LI Shun-dong,YANG Xiao-li,ZUO Xiang-jian,et al.Privacy-preserving graphical similarity determination[J].Acta Electronica Sinica,2017,45(9):2184-2189.(in Chinese)
[10] LIU L,CHEN X F,LOU W J.Secure three-party computational protocols for triangle area[J].International Journal of Information Security,2016,15(1):1-13.
[11] LINDELL,PINKAS.Privacy preserving data mining[J].Journal of Cryptology,2008,9(8):616-621.
[12] EGERT R,FISCHLIN M,GENS D,et al.Privately computing set-union and set-intersection cardinality via bloom filters[J].European Journal of Operational Research,2015,139(2):371-389.
[13] 窦家维,陈明艳.多重集的保密计算及应用[J].电子学报,2020,48(1):204-208. DOU Jia-wei,CHEN Ming-yan.Secure multi-set operations and their applications[J].Acta Electronica Sinica,2020,48(1):204-208.(in Chinese)
[14] BONEH D,WATERS B.Conjunctive,subset,and range queries on encrypted data[A].Proceedings of Theory of Cryptography Conference[C].Berlin:Springer,2007.535-554.
[15] NISHIDE T,OHTA K.Multiparty computation for interval,equality,and comparison without bit-decomposition protocol[A].Proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography[C].Berlin:Springer,2007.343-360.
[16] 郭奕旻,周素芳,窦家维,等.高效的区间保密计算及应用[J].计算机学报,2017,41(7):1664-1679. GUO Yi-min,ZHOU Su-fang,DOU Jia-wei,et al.Efficient privacy-preserving interval computation and its applications[J].Chinese Journal of Computers,2017,41(7):1664-1679.(in Chinese)
[17] 陈振华,李顺东,陈立朝,等.点和区间关系的全隐私保密判定[J].中国科学:信息科学,2018,48(2):187-204. CHEN Zhen-hua,LI Shun-dong,CHEN Li-zhao,et al.Fully privacy-preserving determination of point-range relationship[J].Scientia Sinica Informationis,2018,48(2):187-204.(in Chinese)
[18] 窦家维,王文丽,刘旭红,等.有理区间的安全多方计算与应用[J].电子学报,2018,46(9):11-16. DOU Jia-wei,WANG Wen-li,LIU Xu-hong,et al.Secure multiparty computation of rational interval and its applications[J].Acta Electronica Sinica,2018,46(9):11-16.(in Chinese)
[19] 窦家维,王文丽,李顺东.区间位置关系的保密判定[J].计算机学报,2019,42(5):1031-1044. DOU Jia-wei,WANG Wen-li,LI Shun-dong.Privately determining interval location relation[J].Chinese Journal of Computers,2019,42(5):1031-1044.(in Chinese)
[20] STEFANA W,DANIELB M,FABIANB F,et al.Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques[J].Journal of Computer Security,2017,25(1):59-81.
[21] SHI L,LUO Y L,ZHANG C Y.Secure two-party multi-dimensional vector comparison protocol[A].International Conference on Management and Service Science[C].Wuhan:IEEE,2009.1-5.
[22] PAILLIER P.Public-key cryptosystems based on composite degree residuosity classes[A].Advances in Cryptology[C].Czech Republic:Springer,1999.223-238.
[23] NERGIZ A E,NERGIZ M E,Pedersen T,et al.Practical and secure integer comparison and interval check[A].2010 IEEE Second International Conference on Social Computing[C].Minneapolis:IEEE,2010.791-799. |