[1] YAO A C. Protocols for secure computations[C]//Proceedings of the 16th Annual Symposium on Foundations of Computer Science. Piscataway, NJ: IEEE, 1982: 160-164. [2] CHOI S G, HWANG K W, KATZ J, et al. Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces[C]//CT-RSA 2012: Proceedings of the 2012 Cryptographers' Track at the RSA Conference on Topics in Cryptology, LNCS 7178. Berlin: Springer, 2012: 416-432. [3] LOFTUS J, SMART N P. Secure outsourced computation[C]//AFRICACRYPT 2011: Proceedings of the 4th International Conference on Progress in Cryptology, LNCS 6737. Berlin: Springer, 2011: 1-20. [4] 杨高明, 杨静, 张健沛. 聚类的(α, k)-匿名数据发布[J]. 电子学报, 2011, 39(8): 1941-1946.(YANG G M, YANG J, ZHANG J P. Achieving (α, k)-anonymity via clustering in data publishing[J]. Acta Electronica Sinica, 2011, 39(8): 1941-1946.) [5] ATALLAH M J, DU W. Secure multi-party computational geometry[C]//Workshop on Algorithms and Data Structures. Berlin: Springer, 2001: 165-179. [6] CACHIN C. Efficient private bidding and auctions with an oblivious third party[C]//CCS 1999: Proceedings of the 6th ACM Conference on Computer and Communications Security. New York: ACM, 1999: 120-127. [7] GOLDWASSER S. Multi party computations: past and present[C]//Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing. New York: ACM, 1997: 1-6. [8] KATZ J, SAHAI A, WATERS B. Predicate encryption supporting disjunctions, polynomial equations, and inner products[C]//EUROCRYPT 2008: Proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 4965. Berlin: Springer, 2008: 146-162. [9] WATANABE Y, SHIKATA J. Identity-based hierarchical key-insulated encryption without random oracles[C]//PKC 2016: Proceedings of the 19th IACR International Conference on Practice and Theory in Public-key Cryptography, LNCS 9614. Berlin: Springer, 2016:255-279. [10] CLEAR M, TEWARI H, MCGOLDRICK C. Anonymous IBE from quadratic residuosity with improved performance[C]//AFRICACRYPT 2014: Proceedings of the 7th International Conference on Cryptology on Progress in Cryptology, LNCS 8469. Berlin: Springer, 2014: 377-397. [11] CLEAR M, MCGOLDRICK C. Policy-based non-interactive outsourcing of computation using multikey FHE and CP-ABE[C]//SECRYPT 2013: Proceedings of the 2013 International Conference on Security and Cryptography. Piscataway, NJ: IEEE, 2013: 1-9. [12] LONGO R, MARCOLLA C, SALA M. Collaborative multi-authority KP-ABE for shorter keys and parameters[EB/OL].[2016-03-10]. https://eprint.iacr.org/2016/262.pdf. [13] BONEH D, WATERS B. Conjunctive, subset, and range queries on encrypted data[C]//TCC 2007: Proceedings of the 4th Conference on Theory of Cryptography. Berlin: Springer, 2007: 535-554. [14] ZHANG M, WANG X, YANG X, et al. Efficient predicate encryption supporting construction of fine-grained searchable encryption[C]//Proceedings of the 20135th International Conference on Intelligent Networking and Collaborative Systems. Piscataway, NJ: IEEE, 2013: 438-442. [15] TAN Z, ZHANG W. A predicate encryption scheme supporting multiparty cloud computation[C]//Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems. Piscataway, NJ: IEEE, 2015: 252-256. [16] LEWKO A, OKAMOTO T, SAHAI A, et al. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption[C]//EUROCRYPT 2010: Proceedings of the 29th Annual International Conference on Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2010: 62-91. [17] BONEH D, GOH E J, NISSIM K. Evaluating 2-DNF formulas on ciphertexts[C]//TCC 2005: Proceedings of the Second International Conference on Theory of Cryptography. Berlin: Springer, 2005: 325-341. |