共 9 条
- [1] Fagin R.(1996)Comparing information without leaking it Commun ACM 39 77-85
- [2] Naor M.(2004)A protocol of comparing information without leaking J Software 15 421-427
- [3] Winkler P.(2009)A proof of Yao’s protocol for secure two-party computation J Cryptology 22 161-188
- [4] Qin J.(1979)How to share a secret Commun ACM 22 612-613
- [5] Zhang Z. F.(undefined)undefined undefined undefined undefined-undefined
- [6] Feng D. G.(undefined)undefined undefined undefined undefined-undefined
- [7] Lindell Y.(undefined)undefined undefined undefined undefined-undefined
- [8] Pinkas B.(undefined)undefined undefined undefined undefined-undefined
- [9] Shamir A.(undefined)undefined undefined undefined undefined-undefined