Yao A C. Protocols for secure computations//Proceedings 23rd Annual IEEE Symposium on Foundations of Computer Science. Los Alamitos: IEEE Computer Society Press, 1982: 160-164.
[2]
Du Wenliang. A study of several specific secure two-party computation problems. West Lafayette: Purdue University, 2000.
[3]
Du Wenliang, Atallah M J. Privacy-preserving cooperative scientific computations//Proceedings 14th IEEE Computer Security Foundations Workshop. Nova Scotia: , 2001: 273-282.
[4]
Cramer R, Kiltz E, Padro C. A note on secure computation of the moore-pnerose pseudoinverse and its application to secure linear algebra//Menezes A. CRYPTO 2007. Heidelberg: Springer-Verlag, 2007: 613-630.
[5]
刘文, 罗守山, 陈萍. 保护私有信息的点线关系判定协议及其应用[J]. 北京邮电大学学报, 2008, 31(2): 72-75. Liu Wen, Luo Shoushan, Chen Ping. Privacy-preserving point-line relation determination protocol and its applications[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(2): 72-75.
[6]
李顺东, 窦家维, 贾晓林. 集合相交问题的双方保密计算[J]. 西安交通大学学报, 2006, 40(10): 1091-1093. Li Shundong, Dou Jiawei, Jia Xiaolin. Secure two-party computation for set intersection problem[J]. Journal of Xi'an Jiaotong University, 2006, 40(10): 1091-1093.
[7]
Howie J M. Fundamentals of semigroup theory[M]. London: Oxford University Press, 1995. 45-63.