[13] |
MALEKA S , AMJED S , RANGAN C P . The deterministic protocol for rational secret sharing[C]// The 22th IEEE International Parallel and Distributed Processing. 2008: 1-7.
|
[14] |
IZMALKOV S , MICALI S , LEPINSKI M . Rational secure computation and ideal mechanism design[C]// The 46th Annual Symposium on Foundations of Computer Science (FOCS 2005). 2005: 585-595.
|
[15] |
FUCHSBAUER G , KATZ J , NACCACHE D . Eficient rational secret sharing in the standard communication networks[C]// Theory of Cryptography Conf (TCC 2010). 2010: 419-436.
|
[16] |
ASHAROV G , LINDELL Y . Utility dependence in correct and fair rational secret sharing[J]. Journal of Cryptology, 2011,24(1): 157-202.
|
[1] |
GOLDREICH O . Secure multi-party computation[EB/OL]. .
|
[2] |
CRAMER R , . Introduction to secure computation[M]// Lectures on Data Security.Berlin Heidelberg:Springer. 1999: 16-62.
|
[3] |
YAO A C , . Protocols for secure computation[C]// The 23rd IEEE Symposium on Foundations of Computer Science(FOCS 1982). 1982: 160-164.
|
[4] |
GOLDREICH O , MICALI S , WIGDERSON A . How to play any mental game[C]// The 19th Annual ACM Symposium on Theory of Computing(STOC 1987). 1987: 218-229.
|
[5] |
GOLDREICH O . Foundations of cryptography:basic application[M]. Cambridge: Cambridge University PressPress, 2004.
|
[6] |
QIN J , ZHANG Z F , FENG D G ,et al. A protocol of comparing information without leaking[J]. Journal of Software, 2004,15(3): 421-427.
|
[7] |
LI S D , DAI Y Q , YOU Q Y . An efficient solution to Yao’s millionaires’problem[J]. Acta Electronica Sinica, 2005,33(5): 769-773.
|
[8] |
ZHOU S G , LI F , TAO Y F ,et al. Privacy preservation in database applications:a survey[J]. Chinese Journal of Computers, 2009,32(5): 847-861.
|
[9] |
ZHANG F , CHANG H Y . Privacy-preserving qutlier detection with oblivious third party[J]. Journal of Computer Research and Development, 2007,44(S): 226-231.
|
[10] |
GORDON D , HAZAY C , KATZ J ,et al. Complete fairness in secure two-party computation[C]// The 40th Annual ACM Symposium on Theory of Computing (STOC 2008). 2008: 413-422.
|
[11] |
HALPERN J , TEAGUE V . Rational secret sharing and multiparty computation[C]// The 36th Annual ACM Symposium on Theory of Computing(STOC 2004). 2004: 623-632.
|
[12] |
KOL G , NAOR M . Cryptography and game theory:designing protocols for exchanging information[C]// The 5th Theory of Cryptography Conf (TCC 2008). 2008: 317-336.
|