Research on the Problem of Privacy-Preserving Closest Pair
暂无分享,去创建一个
[1] Qin Jing. A Protocol of Comparing Information without Leaking , 2004 .
[2] Shafi Goldwasser,et al. Multi party computations: past and present , 1997, PODC '97.
[3] Wenliang Du,et al. Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.
[4] Luo,et al. A Secure Protocol for Determining Whether a Point is Inside a Convex Polygon , 2006 .
[5] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[6] Ananth Grama,et al. An efficient protocol for Yao's millionaires' problem , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[7] Wenliang Du,et al. Secure Multi-party Computational Geometry , 2001, WADS.
[8] Luo,et al. Privacy-Preserving Distance Measurement and Its Applications , 2006 .
[9] Marc Fischlin,et al. A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires , 2001, CT-RSA.
[10] Pim Tuyls,et al. Practical Two-Party Computation Based on the Conditional Gate , 2004, ASIACRYPT.
[11] Yonglong Luo,et al. Secure Two-Party Point-Circle Inclusion Problem , 2007, Journal of Computer Science and Technology.
[12] Christian Cachin,et al. Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.
[13] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.