[1]Yao Andrew Chi-Chih.Protocols for secure computations [C]. proceedings of the Proc of the 23rd Annual IEEE Symposium on Foundations of Computer Science, 1982, 1982.
[2]程楠, 赵运磊.一种高效的关于两方集合并交集基数的隐私计算方法[J].密码学报, 2020, 8(2):352-64
[3]巩林明, 王道顺, 刘沫萌, 高全力, 邵连合, 王明明.基于无匹配差错的 计算[J].计算机学报, 2020, 43(9):1769-90
[4]Wang Qiang, Zhou Fucai, Xu Jian, Peng Su .Tag-based verifiable delegated set intersection over outsourced private datasets [J].IEEE Transactions on Cloud Computing, 2020, 1( 1):1-1
[5]Kamara Seny, Mohassel Payman, Raykova Mariana, Sadeghian Saeed.Scaling private set intersection to billion-element sets [C]. proceedings of the International Conference on Financial Cryptography and Data Security, 195-215, Springer, 2014.
[6]王勤, 魏立斐, 刘纪海, 张蕾.基于云服务器辅助的多方隐私交集计算协议[J].计算机科学, 2021, 48(10):301-307
[7]Shor Peter W.Algorithms for quantum computation: discrete logarithms and factoring [C]. proceedings of the Proceedings 35th annual symposium on foundations of computer science, 124-34, IEEE, 1994.
[8]Grover Lov K.Quantum mechanics helps in searching for a needle in a haystack[J].Physical review letters, 1997, 79(2):325-328
[9]Xu Yinsong, Liu Wenjie, Yu Wenbin.Quantum forgery attacks on COPA,AES-COPA and marble authenticated encryption algorithms[J].Quantum Information Processing, 2021, 20(4):1-21
[10]Shi Runhua, Mu Yi, Zhong Hong, Zhang Shun, Cui Jie.Quantum private set intersection cardinality and its application to anonymous authentication[J].Information Sciences, 2016, 370(371):147-158
[11]Shi Run-hua.Quantum private computation of cardinality of set intersection and union[J].The European Physical Journal D, 2018, 72(12):1-6
[12]Shi Run-Hua.Efficient quantum protocol for private set intersection cardinality [J]. IEEE Access, 2018, 6(1):73102-73109
[13]Shi Runhua, Zhang Mingwu.A feasible quantum protocol for private set intersection cardinality[J].IEEE Access, 2019, 7(1):72105-72112
[14]Liu Bai, Zhang Mingwu, Shi Runhua.Quantum secure multi-party private set intersection cardinality[J].International Journal of Theoretical Physics, 2020, 59(7):1992-2007
[15]Zhang Cai, Long Yinxiang, Sun Zhiwei, Li Qin, Huang Qiong .Three-party quantum private computation of cardinalities of set intersection and union based on GHZ states [J].Scientific Reports, 2020, 10(1):1-10
[16]Wang Yongli, Hu Peichu, Xu Qiuliang.Quantum Protocols for Private Set Intersection Cardinality and Union Cardinality Based on Entanglement Swapping[J].International Journal of Theoretical Physics, 2021, 60(9):3514-28
[17]Shi Runhua, Mu Yi, Zhong Hong, Cui Jie, Zhang Shun.An efficient quantum scheme for private set intersection[J].Quantum Information Processing, 2016, 15(1):363-71
[18]Cheng Xiaogang, Guo Ren, Chen Yonghong.Cryptanalysis and improvement of a quantum private set intersection protocol[J].Quantum Information Processing, 2017, 16(2):1-8
[19]Maitra Arpita.Quantum secure two-party computation for set intersection with rational players[J].Quantum Information Processing, 2018, 17(8):1-21
[20]Debnath Sumit Kumar, Dey Kunal, Kundu Nibedita, Choudhury Tanmay .Feasible private set intersection in quantum domain [J].Quantum Information Processing, 2021, 20(1):1-11
[21]Liu Wen, Yin Hanwen.A Novel Quantum Protocol for Private Set Intersection[J].International Journal of Theoretical Physics, 2021, 60(6):2074-83
[22]Liu Wenjie, Li Wenbo, Wang Haibin. An Improved Quantum Private Set Intersection Protocol Based on Hadamard Gates [J].International Journal of Theoretical Physics, 2022, 61(3):1-11
[23]Shi Runhua, Mu Yi, Zhong Hong, Cui Jie, Zhang Shun.Two quantum protocols for oblivious set-member decision problem[J].Scientific Reports, 2015, 5(1):1-9
[24]Lo Hoi-Kwong, Ma Xiongfeng, Chen Kai .Decoy state quantum key distribution [J].Physical review letters, 2005, 94(23):230504-1-230504-4
[25]Ma Xiongfeng, Qi Bing, Zhao Yi, Lo Hoi-Kwong .Practical decoy state for quantum key distribution [J].Physical Review A, 2005, 72(1):012326-1-012326-15
[26]Gao Fei, Qin Sujuan, Wen Qiaoyan, Zhu Fuchen .A simple participant attack on the brádler-du?ek protocol [J].Quantum information computation, 2007, 7(4):329-334
[27]Song Ting-Ting, Wen Qiao-Yan, Gao Fei, Chen Hui .Participant attack and improvement to multiparty quantum secret sharing based on GHZ states [J].International Journal of Theoretical Physics, 2013, 52(1):293-301
|