[1] |
FRITCHMAN K,SAMINATHAN K,DOWSLEY R,et al.Privacy-preserving scoring of tree ensembles:a novel framework for AI in healthcare[C]//Proceedings of 2018 IEEE International Conference on Big Data.Washington D.C.,USA:IEEE Press,2018:2413-2422.
|
[2] |
SUNDARI S,ANANTHI M.Secure multi-party computation in differential private data with data integrity protection[C]//Proceedings of 2015 International Conference on Computing and Communications Technologies.Washington D.C.,USA:IEEE Press,2015:180-184.
|
[3] |
CUI Weirong,DU Chenglie,CHEN Jinchao.PSP:proximity-based secure pairing of mobile devices using WIFI signals[J].Wireless Networks,2019,25(2):733-751.
|
[4] |
YAO A C.Protocols for secure computations[C]//Proceedings of the 23rd IEEE Sympsoium on Foundations of Computer Science.Washington D.C.,USA:IEEE Press,1982:160-164.
|
[5] |
GOLDREICH O,MICALI S,WIGDERSON A.How to play any mental game[C]//Proceedings of the 19th Annual ACM Symposium on Theory of Computing.New York,USA:ACM Press,1987:218-229.
|
[6] |
YAO A C.How to generate and exchange secrets[C]//Proceedings of the 27th Annual Symposium on Foundations of Computer Science.Washington D.C.,USA:IEEE Press,1986:162-167.
|
[7] |
IOANNIDIS I,GRAMA A.An efficient protocol for Yao's millionaires' problem[C]//Proceedings of the 36th Annual Hawaii International Conference on System Sciences.Washington D.C.,USA:IEEE Press,2003:6-9.
|
[8] |
QIN Jing,ZHANG Zhenfeng,FENG Dengguo,et al.A protocol of comparing information without leaking[J].Journal of Software,2004,15(3):421-427.(in Chinese)秦静,张振峰,冯登国,等.无信息泄露的比较协议[J].软件学报,2004,15(3):421-427.
|
[9] |
JIA Hengyue,WEN Qiaoyan,SONG Tingting,et al.Quantum protocol for millionaire problem[J].Optics Communications,2011,284(1):545-549.
|
[10] |
JAWUREK M,KERSCHBAUM F,ORLANDI C.Zero-knowledge using garbled circuits:how to prove non-algebraic statements efficiently[C]//Proceedings of 2013 ACM SIGSAC Conference on Computer and Communications Security.New York,USA:ACM Press,2013:955-966.
|
[11] |
NAKAI T,TOKUSHIGE Y,MISAWA Y,et al.Efficient card-based cryptographic protocols for millionaires' problem utilizing private permutations[C]//Proceedings of 2016 International Conference on Cryptology and Network Security.Berlin,Germany:Springer,2016:500-517.
|
[12] |
MIYAHARA D,HAYASHI Y,MIZUKI T,et al.Practical and easy-to-understand card-based implementation of Yao's millionaire protocol[C]//Proceedings of 2018 International Conference on Combinatorial Optimization and Applications.Berlin,Germany:Springer,2018:246-261.
|
[13] |
ONO H,MANABE Y.Efficient card-based cryptographic protocols for the millionaires' problem using private input operations[C]//Proceedings of 2018 Asia Joint Conference on Information Security.Washington D.C.,USA:IEEE Press,2018:23-28.
|
[14] |
MOHASSEL P,ROSULEK M,ZHANG Y.Fast and secure three-party computation:the garbled circuit approach[C]//Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.New York,USA:ACM Press,2015:591-602.
|
[15] |
ZHAO Chuan,ZHAO Shengnan,ZHANG Bo,et al.Secure comparison under ideal/real simulation paradigm[J].IEEE Access,2018,6(5):31236-31248.
|
[16] |
LIN H Y,TZENG W G.An efficient solution to the millionaires' problem based on homomorphic encryption[C]//Proceedings of 2005 International Conference on Applied Cryptology and Network Security.Berlin,Germany:Springer,2005:456-466.
|
[17] |
LIU Xin,LI Shundong,LIU Jian,et al.Secure multiparty computation of a comparison problem[J].SpringerPlus,2016,5(1):1489-1497.
|
[18] |
LIU M,NANDA P,ZHANG X,et al.Asymmetric commutative encryption scheme based efficient solution to the millionaires problem[C]//Proceedings of 2018 IEEE International Conference on Big Data Science and Engineering.Washington D.C.,USA:IEEE Press,2018:990-995.
|
[19] |
LI Zhanli,CHEN Lichao,CHEN Zhenhua,et al.Design and applications of efficient protocol of millionaires' problem based on 1-r encoding[J].Journal of Cryptologic Research,2019,6(1):50-60.(in Chinese)李占利,陈立朝,陈振华,等.基1-r编码的高效百万富翁问题协议及应用[J].密码学报,2019,6(1):50-60.
|
[20] |
LI Shundong,ZUO Xiangjian,YANG Xiaoli,et al.Secure vector dominance protocol and its applications[J].Acta Electronica Sinica,2017,45(5):1117-1123.(in Chinese)李顺东,左祥建,杨晓莉,等.安全向量优势协议及其应用[J].电子学报,2017,45(5):1117-1123.
|
[21] |
ZUO Xiangjian,LI Shundong,YANG Xiaoli.An efficient homomorphic encryption based solution to millionaires' problem[J].Journal of Chinese Computer Systems,2017,38(3):455-459.(in Chinese)左祥建,李顺东,杨晓莉.同态加密的百万富翁问题高效解决方案[J].小型微型计算机系统,2017,38(3):455-459.
|
[22] |
FREEDMAN M J,HAZAY C,NISSIM K,et al.Efficient set intersection with simulation-based security[J].Journal of Cryptology,2016,29(1):115-155.
|