共 13 条
[1]
Protocols for secure computations. A Yao. Proceeding of the 23th IEEE Symposium on Foundations of Computer Science . 1982
[2]
Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters. Wen-Guey Tzeng. IEEE Transactions on Computers . 2004
[3]
Efficient oblivious transfer protocols. M Naor,B Pinkas. Proc 12th Ann Symp Discrete Algorithms . 2001
[4]
Comparing information without leaking it. Ronald Fagin,Moni Naor,Peter Einkler. Communications of the ACM . 1996
[5]
Privacy preserving data mining. Y Lindell,B Pinkas. Journal of Cryptology . 2002
[6]
Secure multi-party computational geometry. Mikhail J Atallah,Wenliang Du. In Seventh International Workshop on Algorithms and Data Structures (WADS 2001), Lecture Note in Computer Science 2125 . 2001
[7]
Multi-party computations: Past and present. S Goldwasser. Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing . 1997
[8]
How to play ANY mental game. Oded Goldreich,Silvio Micali,Avi Wigderson. Proceedings of the nineteenth annual ACM conference on Theory of computing . 1987
[9]
Efficient private bidding and auction with an obvious third party. C Cachin. Proceeding of the 6th ACM conference on computer and communication security . 1999
[10]
CryptographyandNetworkSecurity:PrinciplesandPractice. WilliamStallings. . 2003