共 23 条
[1]
Boudot F., Schoenmakers B., Traore J., A fair and efficient solution to the socialist millionaires' problem, Discrete Applied Mathematics, 111, 1-2, pp. 23-36, (2001)
[2]
Canetti R., Security and composition of multi-party cryptographic protocols, Journal of Cryptology, 13, 1, pp. 143-202, (2000)
[3]
Cramer R., Damgard I., Nielsen J.B., Multi-party computation from threshold homomorphic encryption, (2000)
[4]
Cramer R., Damgard I., Nielsen J.B., Multi-party computation from threshold homomorphic encryption, Lecture Notes in Computer Science, 2045, (2001)
[5]
Damgaard I., Fitzi M., Kiltz E., Nielsen J.B., Toft T., Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation, Proceedings of the Third Theory of Cryptography Conference, TCC, pp. 285-304, (2006)
[6]
Damgard I., Jurik M., Nielsen J., A generalization of Paillier's public-key system with applications to electronic voting, (2003)
[7]
Du W., Zhan Z., Building decision tree classifier on private data, IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, 14, pp. 1-8, (2002)
[8]
Freedman M.J., Nissim K., Pinkas B., Efficient private matching and set intersection, Eurocrypt 2004, (2004)
[9]
Gilburd B., Schuster A., Wolff R., Privacy-preserving data mining on data grids in the presence of malicious participants, Proceedings of HPDC04, (2004)
[10]
Goldreich O., The Foundations of Cryptography, General Cryptographic Protocols, 2, (2004)