2Andrew C Yao.Protocols for secure computations[C].Proceedings of the 23rd FOCS.Chicago:IEEE,1982:160-164.
3Feigenbaum J.Encrypting problem instances[C].Proceedings of CRYPTO'85.London:Springer-Verlag,1986:477-488.
4Ahituv N,Lapid Y,Neumann S.Processing encrypted data[J].Communications of the ACM,1987,30(9):777-780.
5Abadi M,Feigenbaum J,K ilian J.On hiding information from an Oracle[C].Proceedings of the 19th ACM Symposium on Theory of Computing.New York:ACM,1987:195-203.
6Abadi M,Feigenbaum J,Kilian J.On hiding information from an oracle (extended abstract)[J].Journal of Computer and System Sciences,1989,39(1):21-50.
7Yu K W,Tong Lai Yu.Data encryption based upon time reversal transformations[J].Computer Journal,1989,32(3):241-245.
8Yu K W,Yu T L.Superimposing encrypted data[J].Communications of the ACM,1991,34(2):48-54.
9Rivest R L,Adlem an L,Dertouzos M L.On data banks and privacy homomorphism[C].Foundations of Secure Computation.New York:Academic Press,1978:169-179.
10Rivest R L,Shamir A,Adleman L.A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978.21(2):120-126.