[1] |
Sweeney L. k-anonymity: A model for protecting privacy[J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(5): 557-570.
|
[2] |
Machanavajjhala A,Gehrke J,Kifer D,et al.l-diversity: Privacy beyond k-anonymity[C]∥Proc of the 22nd International Conference on Data Engineering,2006:24.
|
[3] |
Li N H,Li T C,Venkatasubramanian S.t-closeness: Privacy beyond k-anonymity and l-diversity[C]∥Proc of the 23rd International Conference on Data Engineering,2007:106-115.
|
[4] |
Dwork C.Differential privacy: A survey of results[C]∥Proc of International Conference on Theory and Applications of Models of Computation,2008:1-19.
|
[5] |
Yao A C.Protocols for secure computations[C]∥Proc of the 23rd Annual Symposium on Foundations of Computer Science,1982:160-164.
|
[6] |
Li Shun-dong, Du Run-meng,Yang Yan-jing,et al.Secure multiparty multi-data ranking[J].Chinese Journal of Computers,2020,43(8):1448-1462.(in Chinese)
|
[7] |
Tang Chun-ming, Hu Ye-zhou, Li Xi-xi.Three round secure multiparty computation based on multi-key full-homomorphic encryption without CRS[J].Journal of Cryptologic Research,2021,8(2): 273-281.(in Chinese)
|
[8] |
Li Wen-qian.The study on key problems of secure multi-party quantum computation[D].Nanjing:Southeast University,2017.(in Chinese)
|
[9] |
Dou Jia-wei,Liu Xu-hong,Zhou Su-fang,et al.Efficient secure multiparty set operations protocols and their application[J].Chinese Journal of Computers,2018,41(8):1844-1860.(in Chinese)
|
[10] |
Zhang Xi, Su Ye,Qin Jing.Secure multiparty computation protocol of set membership’s judge[J].Journal of Shandong University (Natural Science),2020,55(4): 118-126.(in Chinese)
|
[11] |
Lindell Y,Pinkas B. Secure multiparty computation for privacy-preserving data mining[J].Journal of Privacy and Confidentiality,2009,1(1):5.
|
[12] |
Xue Rui, Peng Chang-gen,Tian You-liang.Preface of rational cryptographic protocol column[J].Journal of Cryptologic Research,2019,6(1): 83-86.(in Chinese)
|
[13] |
Wang Qin, Zhu Jian-ming,Gao Sheng.Progress in research on game theory and cryptographic protocols[J].Journal of Cryptologic Research,2019,6(1): 87-99.(in Chinese)
|
[14] |
Tian You-liang,Li Qiu-xian.Research progress on rational cryptography protocol[J].Journal of Guizhou University (Natural Sciences),2018,35(3):14-23.(in Chinese)
|
[15] |
Song Li-hua,Li Tao,Wang Yi-lei.Applications of game theo- ry in blockchain[J].Journal of Cryptologic Research,2019,6(1): 100-111.(in Chinese)
|
[16] |
Peng Chang-gen, Tian You-liang,Liu Hai,et al.A survey on the intersection of cryptography and game theory[J].Journal of Cryptologic Research,2017,4(1): 1-15.(in Chinese)
|
[17] |
Halpern J Y,Teague V. Rational secret sharing and multiparty computation: extended abstract[C]∥Proc of Symposium on the Theory of Computing,2004:623-632.
|
[18] |
Gordon S D, Katz J. Rational secret sharing,revisited[C]∥Proc of Security and Cryptography for Networks Confe- rence,2006:229-241.
|
[19] |
Abrahm I,Dolev D,Gonen R,et al.Distributed computing meets game theory: Robust mechnisms for rational secret sharing and multiparty computation[C]∥Proc of the 25th Annual ACM Symposium on Principles of Distributed Computing,2006:53-62.
|
[20] |
Clifton C,Kantarcioglu M,Vaidya J,et al.Tools for privacy preserving distributed data mining[J].SIGKDD Explorations,2002,4(2):28-34.
|
[21] |
Wei Wei,Chen Jia-zhe,Li Dan,et al.Research on the bit security of elliptic curve Diffie-Hellman[J].Journal of Electronics and Information Technology,2020,42(8):1820-1827.(in Chinese)
|
[22] |
Fang X T, Zeng P, Liu H,et al.Implementation of quantum key distribution surpassing the linear rate-transmittance bound[J].Nature Photonics,2020,14:422-425.
|
[23] |
Tang Jie,Shi Lei,Wei Jia-hua,et al.Multi-party quantum key agreement based on d-level GHZ states[J].Acta Physica Sinica,2020,69(20): 195-200.(in Chinese)
|
|
附中文参考文献:
|
[6] |
李顺东,杜润萌,杨颜璟,等.安全多方多数据排序[J].计算机学报,2020,43(8):1448-1462.
|
[7] |
唐春明,胡业周,李习习.基于多密钥全同态加密方案的无CRS 模型安全多方计算[J].密码学报,2021,8(2): 273-281.
|
[8] |
李文骞.安全多方量子计算中若干关键问题的研究[D].南京:东南大学,2017.
|
[9] |
窦家维,刘旭红,周素芳,等.高效的集合安全多方计算协议及应用[J].计算机学报,2018,41(8):1844-1860.
|
[10] |
张茜,苏烨,秦静.集合成员关系判定的安全多方计算协议[J].山东大学学报(理学版),2020,55(4):118-126.
|
[12] |
薛锐,彭长根,田有亮.理性密码协议专栏序言(中英文)[J].密码学报,2019,6(1):83-86.
|
[13] |
王秦,朱建明,高胜.博弈论与密码协议研究进展[J].密码学报,2019,6(1):87-99.
|
[14] |
田有亮,李秋贤.理性密码协议研究进展[J].贵州大学学报(自然科学版),2018,35(3):14-23.
|
[15] |
宋丽华,李涛,王伊蕾.博弈论在区块链中的应用研究[J].密码学报,2019,6(1):100-111.
|
[16] |
彭长根,田有亮,刘海,等.密码学与博弈论的交叉研究综述[J].密码学报,2017,4(1):1-15.
|
[21] |
魏伟,陈佳哲,李丹,等.椭圆曲线Diffie-Hellman密钥交换协议的比特安全性研究[J].电子与信息学报,2020,42(8):1820-1827.
|
[23] |
唐杰,石磊,魏家华,于等.基于d维GHZ态的多方量子密钥协商[J].物理学报,2020,69(20):195-200.
|