[1] Yao A C.Protocols for secure computations[A].The 23th IEEE Symposiumon Foundations of Computer Science[C].Chicago,Illinois,USA,1982.160-164.
[2] Goldwasser S.Multi-party computations:past and present[A].The 16th Annual ACM Symposium on Principles of Distributed Computing[C].Santa Barbara,California,USA,1997.1-6.
[3] Cramer R,et al.Secure Multiparty Computation[M].London:Cambridge University Press,2015.
[4] 李顺东,等.基于同态加密的高效安全多方计算[J].电子学报,2013,41(4):798-803. Li S D,et al.Efficient secure multiparty computation based on homomorphic encryption[J].Acta Electronica Sinica,2013,41(4):798-803.(in Chinese)
[5] Fang L,et al.Encrypted scalar product protocol for outsourced data mining[A].IEEE 7th International Conference on Cloud Computing[C].Anchorage,Alaska,USA,2014.336-343.
[6] Bringer J,et al.Shade:Secure hamming distance computation from oblivious transfer[A].International Conference on Financial Cryptography and Data Security[C].Okinawa,Japan,2013.164-176.
[7] Freedman M J,et al.Efficient set intersection with simulation-based security[J].Journal of Cryptology,2016,29(1):115-155.
[8] Chen X B,et al.An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement[J].Optics communications,2010.283(7):1561-1565.
[9] Du W L.A study of several specific secure two-party computation problems[D].Purdue University,2001.
[10] Ma S,et al.Public key encryption with delegated equality test in a multi-user setting[J].The Computer Journal,2015.58(4):986-1002.
[11] Sepehri M,et al.A scalable multi-party protocol for privacy-preserving equality test[A].International Conference on Advanced Information Systems Engineering[C].Valencia,Spain,2013.466-477.
[12] 刘文,等.安全多方信息比较相等协议及其应用[J].电子学报,2012.40(5):871-876. Liu W,et al.Secure multi-party comparing protocol and its applications[J].Acta Electronica Sinica,2012,40(5):871-876.(in Chinese)
[13] Goldreich O.The Fundamental of Cryptography:Basic Applications[M].London:Cambridge University Press,2004.
[14] ElGamal T.A public key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE transactions on information theory,1985.31(4):469-472.
[15] Chaum D,et al.An improved protocol for demonstrating possession of discrete logarithms and some generalizations[A].Workshop on the Theory and Application of Cryptographic Techniques[C].Amsterdam,the Netherlands,1987.127-141. |