[1] YAO A C. Protocols for secure computations[C]//Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science. Piscataway:IEEE,1982:160-164. [2] GOLDREICH O,MICALI S,WIGDERSON A. How to play ANY mental game[C]//Proceedings of the 19th Annual ACM Conference on Theory of Computing. New York:ACM,1987:218-229. [3] 王亮. 基于信任传递的移动商务虚拟身份认证机制研究[D]. 北京:北京交通大学,2015:44-47.(WANG L. Research on mobile business virtual identity authentication mechanism based on trust transfer[D]. Beijing:Beijing Jiaotong University,2015:44-47.) [4] 郑炜. 多种机制下基于秘密共享的理性安全多方计算协议的研究[D]. 北京:北京工业大学,2018:34-38. (ZHENG W. Research on rational security multi-party computing protocol based on secret sharing under various mechanisms[D]. Beijing:Beijing University of Technology,2018:34-38.) [5] 李峰, 司亚利, 陈真, 等. 基于信任机制的机会网络安全路由决策方法[J]. 软件学报,2018,29(9):2829-2843.(LI F,SI Y L, CHEN Z,et al. Trust-based security routing decision method for opportunistic networks[J]. Journal of Software,2018,29(9):2829-2843.) [6] 朱友文. 分布式环境下的隐私保护技术及其应用研究[D]. 合肥:中国科学技术大学,2012:77-81.(ZHU Y W. Research on privacy-preserving technologies in distributed environment and their applications[D]. Hefei:University of Science and Technology of China,2012:77-81.) [7] 王煜. 基于安全多方计算的自动信任协商协议研究[D]. 长沙:湖南大学,2012:26-27.(WANG Y. Research on automatic trust negotiation protocol based on secure multi-party computing[D]. Changsha:Hunan University,2012:26-27.) [8] 程亚歌, 胡明生, 公备, 等. 具有强前向安全性的动态门限签名方案[J]. 计算机工程与应用,2020,56(5):125-134.(CHENG Y G,HU M S,GONG B,et al. Dynamic threshold signature scheme with strong forward security[J]. Computer Engineering and Applications,2020,56(5):125-134.) [9] 徐甫. 基于多项式秘密共享的前摄性门限RSA签名方案[J]. 电子与信息学报,2016,38(9):2280-2286.(XU F. Proactive threshold RSA signature scheme based on polynomial secret sharing[J]. Journal of Electronics and Information Technology,2016,38(9):2280-2286.) [10] 程亚歌, 贾志娟, 胡明生, 等. 适用于区块链电子投票场景的门限签名方案[J]. 计算机应用,2019,39(9):2629-2635. (CHENG Y G,JIA Z J,HU M S,et al. Threshold signature scheme suitable for blockchain electronic voting scenarios[J]. Journal of Computer Applications,2019,39(9):2629-2635.) [11] 傅泽源, 张永华, 徐建国. 基于安全多方的公平秘密共享方案[J]. 数学建模及其应用,2018,7(2):30-35.(FU Z Y,ZHANG Y H,XU J G. Fair secret sharing scheme based on secure multiparty[J]. Mathematical Modeling and Its Applications,2018,7(2):30-35.) [12] 王斌, 张磊, 张国印. 基于多方安全计算的属性泛化mix-zone[J]. 通信学报,2019,40(4):83-94.(WANG B,ZHANG L, ZHANG G Y. Attribute generalization mix-zone based on multiple secure computation[J]. Journal on Communications,2019,40(4):83-94.) [13] CHENG Y, HU M, WANG L, et al. A secure multi-party signature scheme based on trust mechanism[C]//Proceedings of the 13th Chinese Conference on Trusted Computing and Information Security,CCIS 1149. Singapore:Springer,2019:119-132. [14] 李顺东, 杜润萌, 杨颜璟, 等. 安全多方多数据排序[J/OL]. 计算机学报[2020-01-16]. http://kns.cnki.net/kcms/detail/11.1826.tp.20190917.1500.007.html. (LI S D,DU R M,YANG Y J,et al. Secure multi-party multi-data sorting[J/OL]. Chinese Journal of Computers[2020-01-16]. http://kns.cnki.net/kcms/detail/11.1826.tp.20190917.1500.007.html.) [15] 李强. 安全多方计算协议的研究与应用[D]. 上海:上海交通大学,2003:6-7.(LI Q. Research and application of secure multiparty computing protocol[D]. Shanghai:Shanghai Jiao Tong University,2003:6-7.) [16] 杨保华, 陈昌. 区块链原理、设计与应用[M]. 北京:机械工业出版社2017:9-19. (YANG B H, CHEN C. Blockchain Principle,Design and Application[M]. Beijing:China Mechine Press,2017:9-19.) [17] ASMUTH C,BLOOM J. A modular approach to key safeguarding[J]. IEEE Transactions on Information Theory,1983,29(2):208-210. [18] HOU Z, TAN M. A CRT-basted (t, n) threshold signature scheme without a dealer[J]. Journal of Computational Information Systems,2015,11(3):975-986. |