1. Boudot, F., Schoenmakers, B., Traore, J.: A fair and efficient solution to the socialist millionaires problem. Discrete Appl. Math. 111, 23–36 (2001)
2. Yao, A.C.: Protocols for secure computations. In: Proceedings 23rd Annual Symposium on Foundations of Computer Science, vol. 82, pp. 160164 (1982)
3. Zhang, H.G., Han, W.B., Lai, X.J., Lin, D.D., Ma, J.F., Li, J.H.: Survey on cyberspace security. Sci. China Inf. Sci. 58(11), 1–43 (2015)
4. Wu, W.Q., Zhang, H.G.: Quantum algorithm to solve function inversion with time–space trade-off. Quantum Inf. Process. 16(7), 1–10 (2017)
5. Gao, F., Qin, S.J., Huang, W., Wen, Q.Y.: Quantum private query: a new kind of practical quantum cryptographic protocol. Sci. China Phys. Mech. Astron. 62(7), 1–12 (2019)