1. Privacy-Preserving Data Mining;Yin,2011
2. Protocols for secure computations;Yao,1982
3. How to play any mental game;Goldreich,1987
4. Public-key cryptosystems based on composite degree residuosity classes;Paillier,1999
5. A public key cryptosystem and a signature scheme based on discrete logarithms;Elgamal;IEEE Trans. Inf. Theory,1985