SAMANTHULA B K,ELMHDWI Y,HOWSER G,et al.A secure data sharing and query processing framework via federation of cloud computing[J].Information Systems,2015,48(C):196-212.DOI:10.1016/j.is.2013.08004.
[2]
杨静,赵家石,张建沛,等.一种面向高维数据挖掘的隐私保护方法[J].电子学报,2013,41(11):2187-2192.DOI:10.3969/j.issn.0372-2112.2013.11.012.YANG J,ZHAO J S,ZHANG J P,et al.A Privacy preservation method for high dimensional data mining[J].Chinese Journal of Electronic,2013,41(11):2187-2192.DOI:10.3969/j.issn.0372-2112.2013.11.012(Ch).
[3]
张静,罗守山,杨义先,等.保护私有信息的点包含协议研究[J].通信学报,2016,37(4):87-95.DOI:10.11959/j.issn.1000-436x.201675.ZHANG J,LUO S S,YANG Y X,et al.Research on the privacy-preserving point-in-polygon protocol[J].Journal on Communications,2016,37(4):87-95.DOI:10.11959/j.issn.1000-436x.201675(Ch).
[4]
GOLDREICH O,MICALI S,WIGDERSON A.How to play ANY mental game[C]//Proceedings o f the19th Annual ACM Conference on Theory o f Computing.New York:ACM,1987:218-229.DOI:10.1145/23395.28420.
[5]
YAO A C.Protocols for secure computations[C]//Proceedings of 23rd IEEE Symposium on Foundations o f Computer Science.Washington,D C:IEEE,1982:160-164.DOI:10.1109/SFCS.1982.38.
[6]
BISKUP J,FLEGEL U.On pseudonymization of audit data for intrusion detection[C]//International Workshop on Designing Privacy Enhancing Technologies:Design Issues in Anonymity and Unobservability,New York:Springer-Verlag,2000:161-180.
[7]
LI C,LIN B G.Privacy-preserving point-inclusion two-party computation protocol[C]//2013 IEEE Fifth International Conference on Computational and Information Sciences(ICC IS).Washington,D C:IEEE Computer Society,2013:257-260.DOI:10.1109/ICCIS.2013.75.
[8]
QIN J,DUAN H W,ZHAO H W,et al.A new lagrange solution to the privacy-preserving general geometric intersection problem[J].Journal o f Network and Computer Applications,2014,46(1):94-99.DOI:10.1016/j.jnca.2014.08.004.
[9]
LIU L,CHEN X,LOU W,et al.A secure three-party computational protocol for triangle area.[J].International J ourna l o f In formation Security,2016,15(1):1-13.DOI:10.1007/978-3-319-08344-5_6.
[10]
左建祥,杨晓莉,李顺东,等.三点共线的保密判断问题及其应用[J].密码学,2016,3(3):238-248.DOI:10.13868/j.cnki.jcr.000124.ZUO J X,YANG X L,LI S D,et al.Privately determining protocol on three points are collinear and its applications[J].Journal o f Cryptologic Research,2016,3(3):238-248.DOI:10.13868/j.cnki.jcr.000124(Ch).
王挺,罗文俊.安全多方计算在空间几何问题中的应用[J].计算机系统应用,2015,24(1):156-160.DOI:10.3969/j.issn.1003-3254.2025.01.029.WANG T,LUO W J.Applications of secure multi-party computation in space geometry problems[J].Computer Systems&Applications,2015,24(1):156-160.DOI:10.3969/j.issn.1003-3254.2025.01.029(Ch).
[13]
陈振华,李顺东,黄琼,等.云外包计算中空间位置关系的保密判定[J].计算机学报,2017,40(2):351-363.DOI:10.11897/SP.J.1016.2017.00351.CHEN Z H,LI S D,HUANG Q,et al.Privacy-preserving determination of spatial location-relation in cloud computing[J].Chinese Journal o f Computers,2017,40(2):351-363.DOI:10.11897/SP.J.1016.2017.00351(Ch).
[14]
GOLDREICH O.Foundations o f Cryptography:Basic Applications[M].London:Cambridge University Press,2004:599-729.
[15]
CLIFTON C,KANTARCIOGLU M,VAIDYA J,et al.Tools for privacy preserving distributed data mining[J].ACM Sigkdd Explorations Newsletter,2002,4(2):28-34.
[16]
KAMM L.Privacy preserving statistical analysis using secure multi-party computation[D].Ulikooli:University of TARTU,2015:50-54.
[17]
罗永龙,黄刘生,荆巍巍,等.空间几何对象相对位置判定中的私有信息保护[J].计算机研究与发展,2006,43(3):410-416.LUO Y L,HUANG L S,JING W W,et al.Privacy protection in the relative position determination for two spatial geometric objects[J].Journal o f Computer Research and Development,2006,43(3):410-416(Ch).
[18]
LI S D,WU C Y,WANG D S,et al.Secure multiparty-computation of solid geometric problem and their applications[J].Information Sciences,2014,282:401-413.