2NACCACHE D, STERN J. A new public - key cryptosystem based on higher residues [ A ]. Association for Computing Machinery, Proc of the 5th ACM Com on Computer and Communications Security: [ C ]. San Francisco : ACM, 1998.59 - 66.
3OKAMOTO T, UCHIYAMA S. A new public key cryptosystem as secure as factoring: [ A ]. Proc of the Advances in Cryptology - EUROCRYPT 98, Lecture Notes in Computer Science : [ C ]. Germany: Springer - Verlag, 1998. 308 - 318.
4PAOLLIER P. Public -key cryptosystem based on composite degree residuosity classes: [ A ]. Proc ofthe Advances in Cryptology - EUROCRYPT99, Lecture Notes in Compute Science : [ C ]. Germany : Springer - Verlag, 1999. 223 - 238.
5FAGIN R, NAOR M. WINKLER P. Comparing information without leaking it[ J ]. Communications of the ACM,1996,39(5) :77 -85.
6DU W L, ATALLAH M J. Secure multiparty computation problem sand applications - a review and open problems:[ A]. Proc 10th ACM/SIGSAC New security Paradigms Workshop : [ C ]. USA New Mexico: Cloudcroft, 2001.11 - 20.