|
[1]
|
Yao, A.C. (1982) Protocols for Secure Computations. The 23rd Annual IEEE Symposium on Foundations of Computer Science, Chicago, 3-5 November 1982, 160-164. [Google Scholar] [CrossRef]
|
|
[2]
|
Benor, M., Goldwasser, S., Widerson, A., et al. (1988) Completeness Theorems for Non-Crypto-Graphic Fault-Tolerant Distributed Computation. The Twentieth Annual ACM Symposium on Theory of Computing, Chicago, 2-4 May 1988, 1-10. [Google Scholar] [CrossRef]
|
|
[3]
|
Dan, B., Giovanni, D.C., Rafail, O., et al. (2004) Public Key Encryption with Keyword Search. International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, 2-6 May 2004, 506-522.
|
|
[4]
|
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., et al. (1996) Role-Based Access Control Models. Computer, 29, 38-47. [Google Scholar] [CrossRef]
|
|
[5]
|
Ruj, S., Stojmenovic, M., Nayak, A. (2014) Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds. IEEE Transactions on Parallel and Distributed Systems, 25, 384-394. [Google Scholar] [CrossRef]
|
|
[6]
|
秦静, 张振峰, 冯登国, 李宝. 一个特殊的安全双方计算协议[J]. 通信学报, 2004(11): 35-42.
|
|
[7]
|
秦静, 张振峰, 冯登国, 李宝. 无信息泄漏的比较协议[J]. 软件学报, 2004(3): 421-427.
|
|
[8]
|
Pinka, B., Schneider, T., Weinert, C. and Wieder, U. (2018) Efficient Circuit-Based PSI via Cuckoo Hashing. In: Nielsen, J.B. and Rijmen, V., Eds., Advances in Cryptology—EUROCRYPT 2018, LNCS, Vol. 10822, Springer, Berlin, 125-157. [Google Scholar] [CrossRef]
|
|
[9]
|
窦家维, 刘旭红, 周素芳, 等. 高效的集合安全多方计算协议及应用[J]. 计算机学报, 2018, 41(8): 1844-1860.
|
|
[10]
|
周素芳, 李顺东, 郭奕旻, 窦家维, 陈振华. 保密集合相交问题的高效计算[J]. 计算机学报, 2018, 41(2): 464-480.
|
|
[11]
|
陈振华, 李顺东, 黄琼, 丁勇, 刘娅茹. 非加密方法安全计算两种集合关系[J]. 软件学报, 2018, 29(2): 473-482.
|
|
[12]
|
唐春明, 林旭慧. 隐私保护集合交集计算协议[J]. 信息网络安全, 2020, 20(1): 9-15.
|
|
[13]
|
李荣花, 武传坤, 张玉清. 判断集合包含关系的安全计算协议[J]. 计算机学报, 2009, 32(7): 1337-1345.
|
|
[14]
|
Dou, J.W., Gong, L.M., Li, S.D., et al. (2016) Ef-ficient Private Subset Computation. Security and Communication Networks, 9, 5965-5976. [Google Scholar] [CrossRef]
|
|
[15]
|
Zhou, S.F., Li, S.D., Dou, J.W., et al. (2017) Efficient Secure Multiparty Subset Computation. Security and Communication Networks, 2017, Article ID: 9717580. [Google Scholar] [CrossRef]
|
|
[16]
|
程楠, 赵运磊. 一种高效的关于两方集合并/交集基数的隐私计算方法[J]. 密码学报, 2021, 8(2): 352-364.
|
|
[17]
|
Li, S.D., Wang, D.S. and Dai, Y.Q. (2009) Symmetric Cryptographic Protocols for Extended Millionaires’ Problem. Science China Information Sciences, 52, 974-982. [Google Scholar] [CrossRef]
|
|
[18]
|
张茜, 苏烨, 秦静. 集合成员关系判定的安全多方计算协议[J]. 山东大学学报(理学版), 2020, 55(4): 118-126.
|
|
[19]
|
窦家维, 刘旭红, 王文丽. 有理数域上两方集合的高效保密计算[J]. 计算机学报, 2020, 43(8): 1397-1413.
|
|
[20]
|
李顺东, 杜润萌, 杨颜璟, 魏琼. 有理数相等的保密判定[J]. 电子学报, 2020, 48(10): 1933-1937.
|
|
[21]
|
Goldreich, O. (2004) Foundation of Cryptography: Volume 2, Basic Appli-cations. Cambridge University Press, London, 599-764. [Google Scholar] [CrossRef]
|
|
[22]
|
Rivest, R.L., Adleman, L.M. and Dertouzos, M.L. (1978) On Data Banks and Privacy Homeomorphisms. In: Foundations of Secure Computation, Academia Pres, Cambridge, 169-177.
|
|
[23]
|
Gamal, T. (1984) A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory, 31, 469-472. [Google Scholar] [CrossRef]
|