TZENG W G. Efficient oblivious transfer schemes [C]//Lecture Notes in Computer Science. Paris:Springer?Verlag, 2002:159-171.
[2]
YAO A C. Protocols for secure computations [C]//Proc. of the 23rd Annual IEEE Symposium on Foundations of Computer Science. Chicago, USA, 1982: 160-164.
[3]
GOLDREICH O. Secure multi?party computation(Manuscript version1.3, 2002)[EB/OL].(2009-10-09). http://www.wisdom.weizmann.ac.il/~oded/pp.html.?
[4]
DU W L, ATALLAH M J. Secure multi-party computation problems and their applications: a review and open problems[C]//Proc of New Security Paradigms Workshop. Cloudcroft, New Mexico, USA, 2001:11-20.?
[5]
仲红,黄刘生,罗永龙. 基于安全多方求和的多候选人 电子选举方案[J].计算机研究与发展, 2006,43 (8):1405-1410. ?ZHONG Hong, HUANG Liusheng, LUO Yonglong. A multi?candidate electronic voting scheme based on secure sum protocol[J]. Computer Research and Development, 2006, 43 (8):1405-1410.?
[6]
ATALLAH M J, DU W L. Secure multi?party computational geometry[C]// WADS2001, Providence, Rhode Island, USA, 2001: 165-179. ?
[7]
罗永龙,黄刘生,荆巍巍,等.空间几何对象相对位置判 定中的私有信息保护[J].计算机研究与发 展,2006,43(3):410-416. ?LUO Yonglong,HUANG Liusheng,JING Weiwei, et al. Privacy protection in the relative position determination for two spatial geometric objects [J].Computer Research and Development, 2006, 43(3): 410-416.?
[8]
罗永龙,黄刘生,荆巍巍,等. 保护私有信息的叉积协议及 其应用[J].计算机学报,2007,30(2):248-254. ?LUO Yonglong,HUANG Liusheng,JING Weiwei, et al. Privacy?preserving cross product protocol and its applications[J].Chinese Journal of Computers,2007,30(2):248-254.?
[9]
LI S D, DAI Y Q. Secure two party computational geometry[J].Journal of Computer Science and Technology,2005,20(2):258-263.?
[10]
刘文,罗守山.安全两方圆计算协议[J].北京邮电大学 学报, 2009, 32(3):32-35. ?LIU Wen, LUO Shoushan . A study of secure two?party circle computation problem[J]. Journal of Beijing University of Posts and Telecommunications, 2009, 32(3):32-35.?
[11]
ZHONG H, HUANG L S, XIONG Y. A weighted Evoting scheme with secret weights [J].Chinese Journal of Electronics, 2006,15(3):413-416.?
[12]
LUO Y L,HUANG L S, ZHONG H. Secure two?party point?circle inclusion problem[J]. Journal of Computer Science and Technology, 2007, 22(1):88-91.?