1National Institute of Standard and Technology. Data Encryption Standard (DES). Federal Information Processing Standards Publication 46 - 3 (FIPS PUB 46 - 3), 1999.
2Rivest R L, Shamir A, Adleman L. A Method for Obtaining Digital Dignatures and Public-Key Cryptosystems[ J ] .Communications of the ACM, 1978, 21(2) :120 - 126.
1Hillol Kargupta, Kamalika Das, Kun Liu .A game theoretic approach toward multi-party privacy preserving distributed data miningJA]. Technical Report Tt?.-CS[C]. 2007,vo1(1):7,443-449.
2Cramer P., Damgard I, Maurer U. General Secure Multi-party Computation from Any Linear Secret Sharing Scheme[A]. Proceedings of" Advances in Cryptology--EUROCRYPT 2000[C]. Berlin: Springer- Verlag, 2003. 316-334.
3HALPERN J,TEAGUE V. Rational secret sharing and multi- party computation:extended abstract[ A]. Proc of 36th ACM Symposium on Theory of Computing(STOC)[C]. Chicago : ACM Press, 2004 : 623 -632.
4A.YAO. Protocols for secure computations[A].ln Proceedings of the 23rd Annual IEEESymposium on Foundations of Computer Science[C]. 1982.PP.160-164.
5Ittai Abraham, Danny Dolev, tZica Gonen, and Joe Halpern. Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multi-party computationIA]. In Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing (PODC)[C]. Colorado, USA, July 2006.
6Du heng. Rational cyptographic protocols with application[D].In: SJT University, 2009.
7swama home page[EB/OL]. www.swarm.org.
8Canetti R. Universally composable security: A new paradigm for cryptographic protocols[R]. Cryptology ePrint Archive, 2000/067(2005), 2000.