Secure two-party computation of the quadratic function's extreme minimal value
暂无分享,去创建一个
[1] Christian Cachin,et al. Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.
[2] Wen-Guey Tzeng,et al. An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption , 2005, ACNS.
[3] Wenliang Du,et al. Secure Multi-party Computational Geometry , 2001, WADS.
[4] Huang Hong-sheng. Privacy-preserving relative position calculation protocols for spatial geometric objects , 2011 .
[5] Ren Jiang,et al. Heterogeneous Distributed Linear Regression Privacy-Preserving Modeling , 2011 .
[6] Dai Yiqi,et al. Secure Multi-Party Computation of Set-Inclusion and Graph-Inclusion , 2005 .
[7] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[8] Jing Wei-wei. A Protocol for Privacy-Preserving Intersect-Determination of Two Polygons , 2007 .
[9] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[10] Yang,et al. An Efficient Protocol for Private Comparison Problem , 2009 .
[11] Luo Ping. Secure multi-party computations of geometric intersections , 2007 .
[12] You Qi-you. An Efficient Solution to Yao's Millionaires' Problem , 2005 .
[13] Ji Dong. A New Distributed Secure Electronic Auction Protocols , 2001 .
[14] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.