[1] YAO A C. Protocols for secure computations[C]//SFCS'82:Proceedings of the 23rd Annual Symposium on Foundations of Computer Science. Washington, DC:IEEE Computer Society, 1982:160-164.
[2] GOLDREICH O, MICALI S, WIGDERSON A. How to play any mental game-a completeness theorem for protocols with honest majority[C]//STOC'87:Proceedings of the 19th Annual ACM Symposium on Theory of Computing. New York:ACM, 1987:218-229.
[3] BEN-OR M, GOLDWASSER S, WIGDERSON A. Completeness theorems for non-cryptographic fault-tolerant distributed computation[C]//STOC'88:Proceedings of the 29th Annual ACM Symposium on Theory of Computing. New York:ACM, 1988:1-10.
[4] YAO A C. How to generate and exchange secrets[C]//SFCS'86:Proceedings of the 27th Annual Symposium on Foundations of Computer Science. Washington, DC:IEEE Computer Society, 1986:162-167.
[5] ZHOU Y H, SHI W M, YANG Y G. A quantum protocol for millionaire problem with continuous variables[J]. Communications in Theoretical Physics, 2014, 61(4):452-456.
[6] MOHASSEL P, WEINREB E. Efficient secure linear algebra in the presence of covert or computationally unbounded adversaries[C]//Proceedings of the Annual International Cryptology Conference, LNCS 5157. Berlin:Springer, 2008:481-496.
[7] SHI R, MU Y, ZHONG H, et al. An efficient quantum scheme for private set intersection[J]. Quantum Information Processing, 2016, 15(1):363-371.
[8] CHUN J Y, HONG D, JEONG I R, et al. Privacy-preserving disjunctive normal form operations on distributed sets[J]. Information Sciences, 2013, 231:113-122.
[9] RINDAL P, ROSULEK M. Improved private set intersection against malicious adversaries[C]//Proceedings of the 2017 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 10210. Berlin:Springer, 2017:235-259.
[10] 罗小双,杨晓元,王绪安.一类可抵抗恶意攻击的隐私集合交集协议[J].计算机应用,2017,37(6):1593-1598.(LUO X S, YANG X Y, WANG X A. A private set intersection protocol against malicious attack[J]. Journal of Computer Applications, 2017, 37(6):1593-1598.)
[11] 张恩,金刚刚.基于同态加密和Bloom过滤器的云外包多方隐私集合比较协议[J].计算机应用,2018,38(8):2256-2260.(ZHANG E, JIN G G. Cloud outsourcing multiparty private set intersection protocol based on homomorphic encryption and Bloom filter[J]. Journal of Computer Applications, 2018, 38(8):2256-2260.)
[12] 马敏耀,陈松良,左羽.基于Goldwasser-Micali加密系统的隐私交集基数协议研究[J].计算机应用研究,2018,35(9):2748-2751.(MA M Y, CHEN S L, ZUO Y. Research on private set intersection cardinality protocol based on Goldwasser-Micali encryption system[J]. Application Research of Computers, 2018, 35(9):2748-2751.)
[13] MOHASSEL P, RINDAL P. ABY3:a mixed protocol framework for machine learning[C]//CCS'18:Proceedings of ACM SIGSAC Conference on Computer and Communications Security. New York:ACM, 2018:35-52.
[14] GOLDWASSER S, MICALI S. Probabilistic encryption & how to play mental poker keeping secret all partial information[C]//STOC'82:Proceedings of the 14th Annual ACM Symposium on Theory of Computing. New York:ACM, 1982:365-377.
[15] GOLDREICH O. Foundations of Cryptography:Basic Applications[M]. Cambridge:Cambridge University Press, 2004:620-621. |