[1] |
BARVE R , SHRIVER E , GIBBONS P B . Modeling and optimizing I/O throughput of multiple disks on a bus[J]. ACM Sigmetrics Performance Evaluation Review, 1999,27(1): 83-92.
|
[2] |
LU Y P , DAVID H C D . Performance study of ISCSI-based storage subsystems[J]. IEEE Communications Magazine, 2003,41(8): 76-82.
|
[3] |
DWORK C , . Differential privacy[C]// International Colloquium on Automata,Languages,& Programming. 2006: 1-12
|
[4] |
PROSERPIO D , GOLDBERG S , MCSHERRY F . Calibrating data to sensitivity in private data analysis[C]// The Third Conference on Theory of Cryptography. 2006: 265-284
|
[5] |
CLIFTON C , KANTARCIOGLU M , VAIDYA J ,et al. Tools for privacy preserving distributed data mining[J]. Sigkdd Explorations, 2002,4(2): 28-34.
|
[6] |
罗永龙, 徐致云, 黄刘生 . 安全多方的统计分析问题及其应用[J]. 计算机工程与应用, 2005,41(24): 141-143.
|
|
LUO Y L , XU Z Y , HUANG L S . Multivariate statistical analysis and its application[J]. Computer Engineering and Applications 200541(24): 141-143.
|
[7] |
张国荣, 印鉴 . 基于博弈论的安全多方求和方法[J]. 计算机应用研究, 2009,26(4): 1497-1499.
|
|
ZHANG G R , YIN J . Multi-party secure sum computation based on game theory[J]. Journal of Computer Applications, 200926(4): 1497-1499.
|
[8] |
王峥, 郝林, 刘义成 . 基于公钥加密的安全多方求和协议[J]. 计算机应用研究, 2017(4): 179-182.
|
|
WANG Z , HAO L , LIU Y C . Secure sum protocol based on public key encryption[J]. Journal of Computer Applications, 2017 (4): 179-182.
|
[9] |
张恩, 朱君哲, 范海菊 ,等. 基于电路计算的理性安全多方求和协议[J]. 密码学报, 2019,6(1): 126-135.
|
|
ZHANG E , ZHU J Z , FAN H J ,et al. Rational secure multiparty sum protocol based on circuit computing[J]. Chinese Journal of Cryptography, 20196(1): 126-135.
|
[10] |
MEHNAZ S , BELLALA G , BERTINO E . A secure sum protocol and its application to privacy-preserving multiparty analytics[C]// The 22nd ACM on Symposium on Access Control Models and Technologies. 2017: 219-230.
|
[11] |
ASHOURI-TALOUKI M , BARAANI-DASTJERDI A . Cryptographic collusion-resistant protocols for secure sum[J]. International Journal of Electronic Security and Digital Forensics, 2017,9(1): 19-34.
|
[12] |
仲红, 黄刘生, 罗永龙 . 基于安全多方求和的多候选人电子选举方案[J]. 计算机研究与发展, 2006,43(8): 1405-1410.
|
|
ZHONG H , HUANG L S , LUO Y L . A multi-candidate electronic voting scheme based on secure sum protocol[J]. Journal of Computer Research and Development, 2006,43(8): 1405-1410.
|
[13] |
田有亮, 彭长根, 马建峰 ,等. 通用可组合公平安全多方计算协议[J]. 通信学报, 2014(2): 54-62.
|
|
TIAN Y L , PENG C G , MA J F ,et al. Universally composable secure multiparty computation protocol with fairness[J]. Jounral on Communications, 2014(2): 54-62.
|
[14] |
LIU W , WANG Y B , FAN W Q . An novel protocol for the quantum secure multi-party summation based on two-particle bell states[J]. International Journal of Theoretical Physics, 2017,56(9): 2783-2791.
|
[15] |
JUNG T , LI X Y , WAN M . Collusion-tolerable privacy-preserving sum and product calculation without secure channel[J]. IEEE Transactions on Dependable and Secure Computing, 2015,12(1):45–57.
|