[1] YAO A C.Protocols for secure computations[A].Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science[C].Chicago:IEEE Press,1982.160-164.
[2] 刘文,王永滨.安全多方信息比较相等协议及其应用[J].电子学报,2012,40(5):871-876. LIU Wen,WANG Yong-bin.Secure multi-party comparing protocol and its applications[J].Acta Electronica Sinica,2012,40(5):871-876.(in Chinese)
[3] 窦家维,李顺东.数据相等问题的安全多方计算方案研究[J].电子学报,2018,46(5):1107-1112. DOU Jia-wei,LI Shun-dong.Secure multiparty computation for the equality problem[J].Acta Electronica Sinica,2018,46(5):1107-1112.(in Chinese)
[4] GONG L M,YANG B,XUE T,et al.Secure rational numbers equivalence test based on threshold cryptosystem with rational numbers[J].Inf Sci,2018,466:44-54.
[5] LI S D,WANG D S,DAI Y Q.Efficient secure multiparty computational geometry[J].Chinese Journal of Electronics,2010,19(2):324-328.
[6] GOLDREICH O.Foundations of Cryptography:Volume 2,Basic Applications[M].London:Cambridge University Press,2004.599-764.
[7] REIMER B,FRIED R,MEHLER B,et al.Brief report:examining driving behavior in young adults with high functioning autism spectrum disorders:a pilot study using a driving simulation paradigm[J].Journal of Autism and Developmental Disorders,2013,43(9):2211-2217.
[8] PAILLIER P.Public-key cryptosystems based on composite degree residuosity classes[A].Proceedings of the Advances in Cryptology[C].Prague:EUROCRYPT,1999.223-238.
[9] DESMEDT Y,FRANKEL Y.Threshold cryptosystems[A].Proceedings of the Workshop on Advances in Cryptology[C].Santa Barbara:CRYPTO,1989.307-315.
[10] LONG Y,CHEN K F,MAO X P.New constructions of dynamic threshold cryptosystem[J].Journal of Shanghai Jiaotong University(Science),2014,19(4):431-435.
[11] 杨波.现代密码学基础[M].北京:清华大学出版社,2015.106-110. YANG B.Foundations of Modern Cryptography[M].Beijing:Tsinghua University Press,2015.106-110.(in Chinese)
[12] LI L,EL-LATIF A A A,NIU X.Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images[J].Signal Processing,2012,92(4):1069-1078.
[13] VICTOR S.Practical threshold signatures[A].Proceedings of the Theory and Application of Cryptographic Techniques[C].Tunisia,2000.207-220. |