参考文献
[1] Yao A. Protocols for Secure Computation[C]//Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science. Los Alamitos, USA: IEEE Computer Society Press, 1982.
[2] Goldreich O. Secure Multi-party Computation(Manuscript Version 1.3)[EB/OL]. (2013-02-01). http://theory.lcs.mit.edu/~ oded.
[3] Du Wenliang, Atallah M J. Secure Multi-party Computation Problems and Their Applications: A Review and Open Problems[C]//Proceedings of New Security Paradigms Workshop. Cloudcroft, USA: [s. n.], 2001.
[4] Atallah M J, Du Wenliang. Secure Multi-party Computational Geometry[C]//Proceedings of WADS’01. [S. l.]: Springer- Verlag, 2001.
[5] Ioannidis I, Grama A. An Efficient Protocol for Yao’s Millio- naire’s Problem[C]//Proceedings of the 36th Annual Hawaii International Conference on System Sciences. Los Alamitos, USA: IEEE Computer Society Press, 2003.
[6] 秦 静, 张振峰, 冯登国, 等. 无信息泄露的比较协议[J]. 软件学报, 2004, 15(3): 421-427.
[7] 李顺东, 戴一奇, 游启友. 姚氏百万富翁问题的高效解决方案[J]. 电子学报, 2005, 33(5): 769-773.
[8] Li Shundong, Wang Daoshun, Dai Yiqi, et al. Symmetric Cryptographic Solution to Yao’s Millionaires Problem and an Evaluation of Secure Multiparty Computations[J]. Information Sciences, 2008, 178(1): 245-255.
[9] 肖 倩, 罗守山, 陈 萍, 等. 半诚实模型下安全多方排序问题的研究[J]. 电子学报, 2008, 36(4): 709-714.
[10] Shi Lei, Luo Yonglong, Zhang Caiyun. Secure Two-party Multi-dimensional Vector Comparison Protocol[C]//Proceedings of Management and Service Science International Conference. Beijing, China: [s. n.], 2009.
[11] 刘 文, 罗守山, 王永滨. 安全两方向量优势统计协议及其应用[J]. 电子学报, 2010, 38(11): 2573-2577.
[12] Luo Yonglong, Huang Liusheng, Yang Wei, et al. An Efficient Protocol for Private Comparison Problem[J]. Chinese Journal of Electronics, 2009, 18(2): 205-209.
[13] Paillier P. Public-key Cryptosystems Based on Composite Degree Residuosity Classes[C]//Proceedings of Cryptology- EUROCRYPT’99. Berlin, Germany: Springer-Verlag, 1999.
编辑 金胡考 |