Efficient Secure Multiparty Computation Protocol for Sequencing Problem over Insecure Channel
暂无分享,去创建一个
Yudong Zhang | Yi Sun | Hua Zhang | Zhengping Jin | Qiao-Yan Wen | Zhengping Jin | Hua Zhang | Yi Sun | Q. Wen | Yudong Zhang
[1] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[2] M. Held,et al. A dynamic programming approach to sequencing problems , 1962, ACM National Meeting.
[3] Pim Tuyls,et al. Practical Two-Party Computation Based on the Conditional Gate , 2004, ASIACRYPT.
[4] J. Munkres. ALGORITHMS FOR THE ASSIGNMENT AND TRANSIORTATION tROBLEMS* , 1957 .
[5] Jami J. Shah,et al. Challenges in feature-based manufacturing research , 1996, CACM.
[6] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[7] M. Held,et al. A dynamic programming approach to sequencing problems , 1962, ACM National Meeting.
[8] Wen-Guey Tzeng,et al. An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption , 2005, ACNS.
[9] Peter Winkler,et al. Comparing information without leaking it , 1996, CACM.
[10] Ananth Grama,et al. An efficient protocol for Yao's millionaires' problem , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[11] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[12] Zheng-an Yao,et al. Secure multi-party computation protocol for sequencing problem , 2011, Science China Information Sciences.
[13] Marc Fischlin,et al. A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires , 2001, CT-RSA.
[14] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[15] Caroline Fontaine,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..
[16] Ian F. Blake,et al. Strong Conditional Oblivious Transfer and Computing on Intervals , 2004, ASIACRYPT.
[17] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[18] Christian Cachin,et al. Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.
[19] Qin Jing. A Protocol of Comparing Information without Leaking , 2004 .
[20] FontaineCaroline,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007 .