共 54 条
[2]
Al Aziz M.M., 2016, Proceedings of the 20th International Database Engineering Applications Symposium, P278, DOI [10.1145/2938503, DOI 10.1145/2938503, 10.1145/2938503.2938507, DOI 10.1145/2938503.2938507]
[3]
Asharov Gilad, 2018, Proceedings on Privacy Enhancing Technologies, V2018, P104, DOI [10.1515/popets-2018-0034, 10.1515/popets-2018-0034]
[4]
Atallah MJ, 2005, LECT NOTES COMPUT SC, V3424, P63
[5]
Garbling Gadgets for Boolean and Arithmetic Circuits
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:565-577
[6]
Secret-Shared Shuffle
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2020, PT III,
2020, 12493
:342-372
[8]
Cheng K, 2020, IEEE INFOCOM SER, P1708, DOI [10.1109/INFOCOM41043.2020.9155279, 10.1109/infocom41043.2020.9155279]
[9]
Secure Similar Sequence Query on Outsourced Genomic Data
[J].
PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18),
2018,
:237-251
[10]
Danezis George., 2014, Proceedings of the 13th Workshop on Privacy in the Electronic Society, P31, DOI [10.1145/2665943.2665952, DOI 10.1145/2665943.2665952]