This work is licensed under the Creative Commons Attribution 4.0 International License.
Yong ge. Design of Several Secure Multi-Party Numerical Computation Basic Protocols [D]. Anhui University,2017.Search in Google Scholar
Li wang, Qingwen wang. Computational protocol for general linear equations protecting private information [J]. Journal of applied mathematics and computational mathematics,2014,28(03):300-307.Search in Google Scholar
Li chen. Research on the application of secure multi-party computing in Internet of Things [D]. Fuzhou University,2014.Search in Google Scholar
Li chen, Baigang lin. Secure Multi-Party Computing Protocol Based on Distributed Linear Equations [J]. Information Network Security,2013(09):2-5.Search in Google Scholar
Li wang. Design and Analysis of several matrix cryptographic protocols [D]. Shanghai University,2013. (in Chinese)Search in Google Scholar
Yang yang. Simple secure multi-party computing protocol [J]. Silicon Valley,2011(10):161+163.Search in Google Scholar
Hengyue jia, Huanping liu. Computer Engineering and Applications,2008(33):112-114.Search in Google Scholar
Zhifang zhang. Multiplicative monotone Stretching scheme [J]. Journal of Graduate School of Chinese Academy of Sciences,2006(06):827-832.Search in Google Scholar
Wenjun luo, Xiang li. Multi-secure Matrix Product Protocol and Its Application [J]. Chinese Journal of Computers,2005(07):1230-1235.Search in Google Scholar
[Hua zhang. Research on Secure Multi-party Computing and its Application [D]. Xidian University,2005.Search in Google Scholar