1 |
RIVEST R , ADLEMAN L , DERTOUZOS M . On Data Banks and Privacy Homeomorphisms[M]. In Foundations of Secure Computation, 1978.169-177.
|
2 |
GENTRY C . A Fully Homomorphic Encryption Scheme[J]. Stanford University, 2009.
|
3 |
YAO Q Z . Protocols for secure computations[A]. Proceedings of 23rd Annual IEEE Symposium on Foundations of Computer Science[C]. Los Alamitos:IEEE Computer Society Press, 1982.160-164.
|
4 |
GOLDREICH O , MICALI S , WIGDERSON A . How to play any mental game[A]. The 19th Annual ACM Conference on Theory of Computing[C]. New York, 1987.218-229.
|
5 |
GOLDWASSER S . Multiparty computations:past and present[A]. Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing[C]. Santa Barbara,C A,USA, 1997.1-6.
|
6 |
DU W L J A . Secure multiparty computation problems and their applications[A]. A Review and Open Problems New Security Paradigms Workshop 2001[C]. Cloudcroft ,New Mexico,USA, 2001.
|
7 |
GENG T , LUO S , XIN Y , et al. Research on secure multiparty computational geometry[J]. Information Computing and Applications, 2011.322-329.
|
8 |
刘文, 王永滨 . 安全多方信息比较相等协议及其应用[J]. 电子学报, 2012,40(5):871-876. LIU W , WANG Y B . Secure multi-party comparing protocol and its applications[J]. ACTA Electronica Sinica, 2012,40(5):871-876.
|
9 |
ZHONG H , SUN Y F , YAN F F , et al. Protocol for privacy-preserving space closet-pair of points[J]. Computer Engineering and Applications, 2011,48(4):87-89.
|
10 |
LU S F , LUO Y L . Privacy-preserving in graham algorithm for finding convex hulls[J]. Computer Engineering and Application, 2008,44(36):130-133.
|
11 |
WANG Q , LUO Y L , HUANG L S . Privacy-preserving protocols for finding the convex hulls[A]. ARES’ 08[C]. Washington,USA, 2008.727-732.
|
12 |
SUN M H , LUO S S , et al. Secure two-party line segments intersection scheme and its application inprivacy-preserveing convex hull intersection[J]. Journal on Communcatios, 2013,34(1):30-42.
|
13 |
GOLDREICH O . The foundations of cryptography[A]. Basic Applications[C]. Cambridge:Cambridge University Press, 2004.
|
14 |
SANDER T , TSCHUDIN C . Protecting mobile agents against malicious hosts[A]. Proceeding of IEEE Symposium of Research in Security and Privacy 1998[C]. Oakland,California,USA, 1998.215-224.
|
15 |
胡予濮 . 格上全同态加密[EB/OL]. . HU Y P . Fully homomorphic encryption on lattice[EB/OL]. .
|
16 |
罗永龙, 黄刘生, 徐维江 等. 一个保护私有信息的多边形相交判定协议[J]. 电子学报, 2007,35(4):685-691. LUO Y L , HUANG L S , XU W J , et al. A protocol for privacy-preserving intersect-determination of two polygons[J]. ACTA Electronica Sinica, 2007,35(4):685-691.
|
17 |
CHEN Z , ZHANG R , LI Z , et al. A homomorphic ElGamal variant based on BGN’s method[A]. 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC.2013)[C]. Beijing:IEEE Computer Society Press, 2013.1-5.
|
18 |
李顺东, 戴一奇, 王道顺 等. 几何相交问题的多方保密计算[J]. 清华大学学报, 2007,47(10):1692-1695. LI S D , DAI Y Q , WANG D S , et al. Secure multi-party computations of geometric intersections[J]. Journal of Tsinghua University, 2007,47(10):1692-1695.
|
19 |
罗永龙, 黄刘生, 荆巍巍 等. 保护私有信息的叉积协议及其应用[J]. 计算机学报, 2007,30(2):248-254. LUO Y L , HUANG L S , JING W W , et al. Privacy-preserving cross product protocol and its application[J]. Chinese Journal of Computers , 2007,30(2):248-254.
|
20 |
刘文, 罗守山, 陈萍 . 保护私有信息的点线关系判定协议及其应用[J]. 北京邮电大学学报, 2008,31(2):72-75. LIU W , LUO P , CHEN C . Privacy-preserving point-line relation determination protocol and its application[J]. Journal of Beijing University of Posts and Telecommunications, 2008,31(2):72-75.
|