共 12 条
- [1] YAO A C., Protocols for secure computations, Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science, pp. 160-164, (1982)
- [2] ROTHBLUM R D, SEALFON A, SOTIRAKI K., Toward non-interactive zero-knowledge proofs for NP from LWE, Journal of Cryptology, 34, 1, pp. 1-35, (2021)
- [3] HOU Hong-xia, YANG Bo, ZHANG Li-na, Et al., Secure two-party SM2 signature algorithm, Acta Electronica Sinica, 48, 1, pp. 1-8, (2020)
- [4] HUANG Yue, ZENG Peng, CHOO K R., An efficient privacy-preserving protocol for computing kth minimum value in P2P networks [J], Journal of Circuits, Systems and Computers, 29, pp. 1-20, (2020)
- [5] AGGARWAL G, MISHRA N, PINKAS B., Secure computation of the median (and other elements of specified ranks), Journal of Cryptology, 23, 3, pp. 373-401, (2010)
- [6] TUENO A, KERSCHBAUM F, KATZENBEISSER S, Et al., Secure computation of the kth-ranked element in a star network, Proceedings of the International Conference on Financial Cryptography and Data Security, pp. 386-403, (2020)
- [7] ZHANG Yuan, CHEN Qing-jun, ZHONG Sheng, Efficient and privacy-preserving min and kth min computations in mobile sensing systems, IEEE Transactions on Dependable and Secure Computing, 14, 1, pp. 9-21, (2015)
- [8] GOLDREICH O., The Fundamental of Cryptography: Basic Applications, pp. 599-764, (2004)
- [9] FREEDMAN M J, HAZAY C, NISSIM K, Et al., Efficient set intersection with simulation-based security, Journal of Cryptology, 29, 1, pp. 115-155, (2016)
- [10] SANG Ying-peng, SHEN Hong, Efficient and secure protocols for privacy-preserving set operations, ACM Transactions on Information and System Security, 13, 1, pp. 9:1-9:35, (2009)