1 |
YAO A C. Protocols for secure computations [A]. Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science [C]. Los Alamitos, USA: IEEE Computer Science Press, 1982. 160 - 164.
|
2 |
ROTHBLUM R D, SEALFON A, SOTIRAKI K. Toward non-interactive zero-knowledge proofs for NP from LWE [J]. Journal of Cryptology, 2021, 34(1): 1 - 35.
|
3 |
侯红霞, 杨波, 张丽娜, 等. 安全的两方协作SM2签名算法 [J]. 电子学报, 2020, 48(1): 1 - 8.
|
|
HOU Hong-xia, YANG Bo, ZHANG Li-na, et al. Secure two-party SM2 signature algorithm [J]. Acta Electronica Sinica, 2020, 48(1): 1 - 8. (in Chinese)
|
4 |
HUANG Yue, ZENG Peng, CHOO K R. An efficient privacy-preserving protocol for computing kth minimum value in P2P networks [J]. Journal of Circuits, Systems and Computers, 2020, 29(09): 1 - 20.
|
5 |
AGGARWAL G, MISHRA N, PINKAS B. Secure computation of the median (and other elements of specified ranks) [J]. Journal of Cryptology, 2010, 23(3): 373 - 401.
|
6 |
TUENO A, KERSCHBAUM F, KATZENBEISSER S, et al. Secure computation of the kth-ranked element in a star network [A]. Proceedings of the International Conference on Financial Cryptography and Data Security [C]. Kota Kinabalu, Malaysia: Springer, 2020. 386 - 403.
|
7 |
ZHANG Yuan, CHEN Qing-jun, ZHONG Sheng. Efficient and privacy-preserving min and kth min computations in mobile sensing systems [J]. IEEE Transactions on Dependable and Secure Computing, 2015, 14(1): 9 - 21.
|
8 |
GOLDREICH O. The Fundamental of Cryptography: Basic Applications [M]. London, Britain: Cambridge University Press, 2004. 599 - 764.
|
9 |
FREEDMAN M J, HAZAY C, NISSIM K, et al. Efficient set intersection with simulation-based security [J]. Journal of Cryptology, 2016, 29(1): 115 - 155.
|
10 |
SANG Ying-peng, SHEN Hong. Efficient and secure protocols for privacy-preserving set operations [J]. ACM Transactions on Information and System Security, 2009, 13(1): 9:1 - 9:35.
|
11 |
SHEIKH R, MISHRA D K. Secure sum computation using homomorphic encryption [A]. Proceedings of the Data Science and Big Data Analytics, Women in Research [C]. Indore, India: 2018. 357 - 363.
|
12 |
李顺东, 王文丽, 杜润萌. 抗恶意敌手的百万富翁问题解决方案[J]. 中国科学: 信息科学, 2021, 51(01): 75 - 88.
|
|
LI Shun-dong, WANG Wen-li, DU Run-meng. Protocol for millionaire’s problem in malicious models [J]. Scientia Sinica Informationis, 2021, 51(01): 75 - 88. (in Chinese)
|