[1]YAO A C.Protocols for secure computations[C]//Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science.Washington D.C.,USA:IEEE Press,1982:160-164.br/
[2]GOLDREICH O,MICALI S,WIGDERSON A.How to play any mental game:a completeness theorem for protocols with honest majority[C]//Proceedings of STOC’87.New York,USA:ACM Press,1987:218-229.br/
[3]BEN-OR M,GOLDWASSER S,WIGDERSON A.Completeness theorems for non-cryptographic fault-tolerant distributed computation[C]//Proceedings of STOC’98.New York,USA:ACM Press,1988:1-10.br/
[4]CHAUM D,CRPEAU C,DAMGARD I.Multi-party unconditionally secure protocols(extended abstract)[C]//Proceedings of STOC’88.New York,USA:ACM Press,1988:11-19.br/
[5]RABIN T,BEN-OR M.Verifiable secret-sharing and multiparty protocols with honest majority[C]//Proceedings of STOC’89.New York,USA:ACM Press,1989:73-85.br/
[6]BEAVER D.Secure multi-party protocols and zero-knowledge proof systems tolerating a faulty minority[J].Journal of Cryptology,1991,4(2):75-122.br/
[7]PINKAS B.Fair secure two-party computation[C]//Proceedings of EUROCRYPT’03.Warsaw,Poland:[s.n.],2003:87-105.
br/
[8]LINDELL Y,PINKAS B.An efficient protocol for secure two party computation in the presence of malicious adversaries[C]//Proceedings of EUROCRYPT’07.Barcelona,Spain:[s.n.],2007:52-78.br/
[9]魏晓超,蒋瀚,赵川.一个高效可完全模拟的n取1茫然传输协议[J].计算机研究与发展,2016,53(11):2475-2481.br/
[10]窦家维,马丽,李顺东.最小值问题的安全多方计算及其应用[J].电子学报,2017,45(7):1715-1721.br/
[11]罗永龙,黄刘生,荆巍巍,等.空间几何对象相对位置判定中的私有信息保护[J].计算机研究与发展,2006,43(3):410-416.br/
[12]李顺东,杨晓莉,左祥建,等.保护私有信息的图形相似判定[J].电子学报,2017,45(9):2184-2189.br/
[13]陈振华,李顺东,王道顺,等.集合成员关系的安全多方计算及其应用[J].电子学报,2017,45(5):1109-1116.br/
[14]魏晓超.高效安全两方计算基础理论及关键技术研究[D].济南:山东大学,2017.br/
[15]宋成,张明月,彭维平,等.基于安全多方计算的车载网隐私保护机制[J].北京邮电大学学报,2017,40(3):67-71.br/
[16]蒋瀚,徐秋亮.实用安全多方计算协议关键技术研究进展[J].计算机研究与发展,2015,52(10):2247-2257.br/ |