1. Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science, SFCS 1982, pp. 160–164. IEEE (1982). doi:
10.1016/0022-2836(81)90087-5
2. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, pp. 218–229. ACM (1987)
3. Goldreich, O.: Secure multi-party computation [EB/OL] (1998).
http://www.wisdom.weizman.ac.il/~oded/pp.html
4. Liu, W., Wang, Y.B.: Secure multi-party comparing protocol and its applications. Acta Electronica Sinica 40(5), 871–876 (2012). (in chinese)
5. Tang, Q.Y., Chuan-Gui, M.A., Yan, G.: Comparing private numbers based on fully homomorphic encryption. J. Inf. Eng. Univ. 13(6), 654–657 (2013). (in chinese)