[1] |
袁博, 王思源. 隐私计算产品评估体系[J]. 信息通信技术与政策, 2021, 47(6):12-18.
|
[2] |
隐私计算联盟. 隐私计算行业观察[EB/OL]. (2021-12-21)[2021-12-23]. https://mp.weixin.qq.com/s/suxhUhXsS6RDgGS8xAm-rg.
|
[3] |
隐私计算联盟. 可信隐私计算安全标准和测试解读[EB/OL]. (2021-12-2)[2021-12-24]. https://mp.weixin.qq.com/s/CKuzDjJJ-PIaVUbE8UlNuA.
|
[4] |
王思源, 闫树. 隐私计算面临的挑战与发展趋势浅析[J]. 通信世界, 2022(2):19-21. DOI: 10.13571/j.cnki.cww.2022.02.007.
doi: 10.13571/j.cnki.cww.2022.02.007
|
[5] |
NAOR M. Efficient oblivious transfer protocols[C]// Symposium on Discrete Algorithms, 2001.
|
[6] |
ISHAI Y. KILIAN J. NISSIM K, et al. Extending oblivious transfers efficiently[C]// 23rd Annual International Cryptology Conference. CiteSeer, 2003.
|
[7] |
AGGARWAL G, MISHRA N, PINKAS B. Secure computation of the kth-ranked element[M]. Springer Berlin Heidelberg, 2004.
|
[8] |
DEMMLER D, SCHNEIDER T, ZOHNER M. ABY-A framework for efficient mixed-protocol secure two-party computation[C]// Network & Distributed System Security Symposium, 2015.
|
[9] |
MOHASSEL P, RINDAL P. ABY 3: a mixed protocol framework for machine learning[C]// the 2018 ACM SIGSAC Conference. ACM, 2018.
|
[10] |
CHENG K, FAN T, JIN Y, et al. Secureboost: a lossless federated learning framework[J]. arXiv, 2019.
|
[11] |
AGUILAR M C, BARRIER J, FOUSSE L, et al. XPIR: private information retrieval for everyone[J]. Proceedings on Privacy Enhancing Technologies, 2015, 2016(2).
|
[12] |
ANGEL S, CHEN H, LAINE K, et al. PIR with compressed queries and amortized query processing[C]// 2018 IEEE symposium on security and privacy (SP). IEEE, 2018: 962-979.
|
[13] |
CHEN H, HUANG Z, LAINE K, et al. Labeled PSI from fully homomorphic encryption with malicious security[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2018:1223-1237.
|
[14] |
KOLESNIKOV V, KUMARESAN R, ROSULEK M, et al. Efficient batched oblivious PRF with applications to private set intersection[C]// Acm Sigsac Conference on Computer & Communications Security. ACM, 2016:818-829.
|