[1] Yao A C.Protocols for secure computations[A].Proceedings of the 23th IEEE Symposium on Foundations of Computer Science[C].Chicago,USA:IEEE Computer Society Press,1982.160-164.
[2] Cramer R,Damgard I B,Nielsen JB.Secure Multiparty Computation[M].London,UK:Cambridge University Press,2015.
[3] Goldreich O.The Fundamental of Cryptography:Basic Applications[M].London,UK:Cambridge University Press,2004.
[4] 李顺东,王道顺.基于同态加密的高效多方保密计算[J].电子学报,2013,41(4):798-803. Li Shun-dong,Wang Dao-shun.Efficient secure multiparty computation based on homomorphic encryption[J].Acta Electronica Sinica,2013,41(4):798-803.(in Chinese)
[5] 李顺东,左祥建,杨晓莉,等.安全向量优势协议及其应用[J].电子学报,2017,45(5):1117-1123. Li Shun-dong,Zuo Xiang-jian,Yang Xiao-li,et al.Secure vector dominance protocol and its applications[J].Acta Electronica Sinica,2017,45(5):1117-1123.(in Chinese)
[6] Tang Chun-ming,Shi Gui-hua,Yao Zheng-an.Secure multi-party computation protocol for sequencing problem[J].Science China Information Sciences,2011,54(8):1654-1662.
[7] Zhou Su-fang,Li Shun-dong,Dou Jia-wei,et al.Efficient secure multiparty subset computation[J].Security & Communication Networks,2017,2017(3):1-11.
[8] Nishide T,Ohta K.Multiparty Computation for Interval,Equality and Comparison Without Bit-Decomposition Protocol[M].Berlin:Springer Berlin Heidelberg,2007.343-360.
[9] 郭奕旻,周素芳,窦家维,等.高效的区间保密计算及应用[J].计算机学报,2017,40(07):1664-1679. Guo Yi-min,Zhou Su-fang,Dou Jia-wei,et al.Efficient privacy-preserving interval computation and its applications[J],Chinese Journal of Computers,2017,40(07):1664-1679.(in Chinese)
[10] Paillier P.Public-key cryptosystems based on composite degree residuosity classes[A].G.Goos.Lecture Notes in Computer Science 1592[C].NY:Springer,1999.223-238. |