Archer, D.W., Bogdanov, D., Lindell, Y., Kamm, L., Nielsen, K., Pagter, J. I., ...&Wright, R. N. (2018). From Keys to Databases- Real-World Applications of Secure Multi- Party Computation [J].TheComputerJournal,61(12), 1749-1771.
[2]
Yao, A. C. C. (1986, October). How to generate and exchange secrets[J]. In 27thAnnual Symposium on Foundations of Computer Science(pp.162-167). IEEE.
[3]
Scholl, P. A. (2015). Design and implementation of secure multi- party computation (Doctoral dissertation, University of Bristol).