Computer Science ›› 2015, Vol. 42 ›› Issue (10): 159-159.
Previous Articles Next Articles
LIU Xin, LI Shun-dong and CHEN Zhen-hua
[1] Sun Cloud Architecture Introduction White Paper[EB/OL].http://developers.sun.com.cn/blog/functionalca/resource/sun_353cloudcomputing_chinese.pdf [2] Feigenbaum J,Can Y.Take advantage of someone without ha-ving to trust him [C]∥Advances in Cryptology Crypto 1985.Berlin:Springer Verlag,1986:477-488 [3] Cramer R,Damgard I.Multiparty Computations,an Introduction[M]∥Advanced Courses in Mathematics,2005:41-87 [4] Yao A C.Protocols for secure computations [C]∥Proceedings of the 23th IEEE Symposium on Foundations of Computer Scie-nce.Washington,DC:IEEE Press,1982:160-164 [5] Goldreich O,Micali S,Wigderson A.How to play any mental game [C]∥Proceedings of the Nineteenth Annual ACM Confe-rence on Theory of Computing.Piscataway:IEEE Press,1987:218-229 [6] Goldwasser S.Multiparty computations:Past and present [C]∥Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing.NY:ACM Press,1997:1-6 [7] Du W L,Atallah M J.Privacy-preserving cooperative scientific computations[C]∥Proc.of the 14th IEEE Computer Security Foundations Workshop.Nova Scotia,Canada,2001:273-282 [8] Du W L,Atallah M J.Privacy-preserving cooperative statistical analysis[C]∥17th Annual Computer Security Applications Conference.New Orleans,Louisiana,USA,2001:102-110 [9] Du W L.A study of several specific secure two-party computation problems[D].West Lafayette:Purdue University,2000 [10] Du W L,Atallah M J.Secure multiparty computation problems and their applications:A review and open problems[C]∥Proceedings of New Security Paradigms Workshop 2001.NY:ACM Press,2001:11-20 [11] 罗文俊,李祥.双向零知识证明与初等函数两方保密计算[J].贵州大学学报(自然科学版),2004,21(1):36-42 Luo Wen-jun,Li Xiang.Two-directional Zero-Knowledge Proof and Secure Two-Party Computation[J].Journal of Guizhou University(Natural Science),2004,21(1):36-42 [12] 罗文俊,李祥.多方安全矩阵乘积协议及应用[J].计算机学报,2005,28(7):1230-1235 Luo Wen-Jun,Li Xiang.The secure multi-party protocol of matrix product and its application[J].Chinese Journal of Compu-ters,2005,28(7):1230-1235 [13] 肖倩,罗守山,陈萍,等.半诚实模型下安全多方排序问题的研究[J].电子学报,2008,34(4):709-714 Xiao Qian,Luo Shou-shan,Chen Ping,et al.Research on the Problem of Secure Multi-party Ranking Under Semi-honest Model[J].Acta Electronica Sinica,2008,34(4):709-714 [14] Goldreich O.The Fundamental of Cryptography:Basic Applications [M].London:Cambridge University Press,2004 [15] 李顺东.3个保密计算服务协议[J].陕西师范大学学报,2010,38(4):1-6 Li Shun-dong.Three specific secure computation service protocols[J].Journal of Shaanxi Normal University,2010,38(4):1-6 [16] Diffie W,Hellman M E.New direction in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):29-40 [17] 李顺东,王道顺.现代密码学:理论、方法与研究前沿[M].北京:科学出版社,2009 Li Shun-dong,Wang Dao-shun.Modern Cryptography:Theory,Method,Research Fronts[M].Beijing:Science Press,2009 [18] Rabaey J,Ammer J,Da Silva Jr J L.Pieo Radio:Ad-hoc wireless networking of ubiquitous low-energy sensor and monitor nodes[C]∥Proceedings of IEEE Computer Society Workshop on VLSI.April 2000:9-12 [19] William P,Brian F,Saul T,et al.LU Decomposition and its applications[M]∥2nd Numerical Recipes in Fortran:The Art of Scientific Computing.Cambridge:University Press,1992 [20] Lin H Y,Tzeng W G.An efficient solution to the millionaires problem based on homomorphic encryption [C]∥Proceedings of Applied Cryptography and Network Security 2005(LNCS3531).NY:Springer,2005:456-466 [21] 李顺东,戴一奇,尤启友.姚氏百万富翁问题的高效解决方案[J].电子学报,2005,33(5):770-773 Li Shun-dong,Dai Yi-qi,You Qi-you.An Efficient Solution to Yao’s Millionaires Problem[J].Acta Electronica Sinica,2005,3(5):770-773 [22] Li S D,Wang D S,Dai Y Q,et al.Symmetric cryptographic solution to yao’s millionaires problem and an evaluation of secure multiparty computations [J].Information Sciences,2008,178(2):244-255 [23] 李顺东,王道顺.基于同态加密的高效多方保密计算[J].电子学报,2013,41(4):798-803 Li Shun-dong,Wang Dao-shun.Efficient Secure Multiparty Computation Based on Homomorphic Encryption[J].Acta Electronica Sinica,2013,41(4):798-803 [24] Malek B,Miri A.Combining attribute-based and access systems[C]∥Proc.of 12th IEEE International Conference on Computational Science and Engineering(CSE 2009).IEEE Computer Society,2009:305-312 |
No related articles found! |
|