[1] |
YAO A C . Protocols for secure computations[C]// Proceedings of the 23rd Annual Symposium on Foundations of Computer Science. Piscataway:IEEE Press, 1982: 160-164.
|
[2] |
YAO A C C . How to generate and exchange secrets[C]// Proceedings of the 27th Annual Symposium on Foundations of Computer Science. Piscataway:IEEE Press, 1986: 162-167.
|
[3] |
IOANNIDIS I , GRAMA A . An efficient protocol for Yao’s millionaires’ problem[C]// Proceedings of the 36th Annual Hawaii International Conference on System Sciences. Piscataway:IEEE Press, 2003:6.
|
[4] |
LI S D , WANG D S , DAI Y Q ,et al. Symmetric cryptographic solution to Yao’s millionaires’ problem and an evaluation of secure multiparty computations[J]. Information Sciences, 2008,178(1): 244-255.
|
[5] |
DAMGARD I , GEISLER M , KROIGARD M . Homomorphic encryption and secure comparison[J]. International Journal of Applied Cryptography, 2008,1(1): 22-31.
|
[6] |
DAMLE S , FALTINGS B , GUJAR S . Blockchain-based practical multi-agent secure comparison and its application in auctions[C]// Proceedings of IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology. New York:ACM Press, 2021: 430-437.
|
[7] |
ZHOU L J , WANG Z Y , CUI H R ,et al. Bicoptor:two-round secure three-party non-linear computation without preprocessing for privacy-preserving machine learning[C]// Proceedings of 2023 IEEE Symposium on Security and Privacy (SP). Piscataway:IEEE Press, 2023: 534-551.
|
[8] |
LIU X M , CHOO K K R , DENG R H ,et al. Efficient and privacy-preserving outsourced calculation of rational numbers[J]. IEEE Transactions on Dependable and Secure Computing, 2018,15(1): 27-39.
|
[9] |
郭奕旻, 周素芳, 窦家维 ,等. 高效的区间保密计算及应用[J]. 计算机学报, 2017,40(7): 1664-1679.
|
|
GUO Y M , ZHOU S F , DOU J W ,et al. Efficient privacy-preserving interval computation and its applications[J]. Chinese Journal of Computers, 2017,40(7): 1664-1679.
|
[10] |
ZHAO B W , LIU X M , SONG A ,et al. PriMPSO:a privacy-preserving multiagent particle swarm optimization algorithm[J]. IEEE Transactions on Cybernetics, 2023,53(11): 7136-7149.
|
[11] |
LIU C , WANG X S , NAYAK K ,et al. ObliVM:a programming framework for secure computation[C]// Proceedings of 2015 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2015: 359-376.
|
[12] |
DEMMLER D , SCHNEIDER T , ZOHNER M . ABY - a framework for efficient mixed-protocol secure two-party computation[C]// Proceedings of Network and Distributed System Security Symposium. Reston:Internet Society, 2015: 1-15.
|
[13] |
KOLESNIKOV V , SCHNEIDER T . Improved garbled circuit:free xor gates and applications[C]// International Colloquium on Automata,Languages,and Programming. Berlin:Springer, 2008: 486-498.
|
[14] |
CANETTI R , POBURINNAYA O , VENKITASUBRAMANIAM M . Equivocating Yao:constant-round adaptively secure multiparty computation in the plain model[C]// Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing. New York:ACM Press, 2017: 497-509.
|
[15] |
GROCE A , KATZ J . Fair computation with rational players[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2012: 81-98.
|
[16] |
LIN H Y , TZENG W G . An efficient solution to the millionaires’ problem based on homomorphic encryption[C]// Applied Cryptography and Network Security. Berlin:Springer, 2005: 456-466.
|
[17] |
LIU X , LI S D , CHEN X B ,et al. Efficient solutions to two-party and multiparty millionaires’ problem[J]. Security and Communication Networks, 2017,2017: 1-11.
|
[18] |
李顺东, 徐雯婷, 王文丽 ,等. 恶意模型下的最大(小)值保密计算[J]. 计算机学报, 2021,44(10): 2076-2089.
|
|
LI S D , XU W T , WANG W L ,et al. Secure maximum (minimum) computation in malicious model[J]. Chinese Journal of Computers, 2021,44(10): 2076-2089.
|
[19] |
ZHAO B W , YUAN J M , LIU X M ,et al. SOCI:a toolkit for secure outsourced computation on integers[J]. IEEE Transactions on Information Forensics and Security, 2022,17: 3637-3648.
|
[20] |
VEUGEN T , BLOM F , HOOGH S J A D ,et al. Secure comparison protocols in the semi-honest model[J]. IEEE Journal of Selected Topics in Signal Processing, 2015,9(7): 1217-1228.
|
[23] |
MAITRA A , PAUL G , PAL A K . Revisiting secure two-party computation with rational player[J]. Cryptology ePrint Archive, 2015: 1-13.
|
[24] |
PAILLIER P . Public-key cryptosystems based on composite degree residuosity classes[C]// Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques. New York:ACM Press, 1999: 223-238.
|
[25] |
DING C , PEI D Y , SALOMAA A . Chinese remainder theorem:applications in computing,coding,cryptography[M]. Singapore: World Scientific, 1996.
|
[26] |
ACHIM O M , POP F , CRISTEA V . Reputation based selection for services in cloud environments[C]// Proceedings of 2011 14th International Conference on Network-Based Information Systems. Piscataway:IEEE Press, 2011: 268-273.
|
[27] |
KATZ J , LINDELL Y . Introduction to modern cryptography[M]. Florida: Chapman and Hall/CRC, 2020.
|
[28] |
GOLDREICH O . Foundations of cryptography:volume 2,basic applications[M]. Cambridge: Cambridge University Press, 2009.
|
[21] |
DAMGARD I , FITZI M , KILTZ E ,et al. Unconditionally secure constant-rounds multi-party computation for equality,comparison,bits and exponentiation[C]// Theory of Cryptography. Berlin:Springer, 2006: 285-304.
|
[22] |
HALPERN J , TEAGUE V . Rational secret sharing and multiparty computation:extended abstract[C]// Proceedings of the Thirty-Sixth Annual ACM Symposium on Theory of Computing. New York:ACM Press, 2004: 623-632.
|