参考文献
[1]WARREN S, BRANDEIS L. The right to privacy [J]. Harvard Law Review, 1890, 4 (5):193-220.
[2]U. S. deparment of commerce/national institute of standards and technology. Data encryption standard(DES)[S/OL]. [2021-12-31]. https://csrc. nist.gov/csrc/media/publications/fips/46/3/archive/1999-10-25/documents/fips46-3.pdf.
[3]DAEMEN J, RIJMEN V. Reijndael:the advanced encryption standard [J]. Dr. Dobb's Journal:Software Tools for the Professional Programmer, 2001, 26 (3):137-139.
[4]RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and publickey cryptosystems [J]. Communications of the ACM, 1978, 21 (2):120-126.
[5]SAMARATI P, SWEENEY L. Protecting privacy when disclosing information:k-anonymity and its enforcement through generalization and suppression [J/OL]. [2022-02-14]. https://dataprivacylab. org/dataprivacy/projects/kanonymity/paper3.pdf.
[6]DWORK C, MCSHERRY F, NISSIM K, et al. Calibrating noise to sensitivity in private data analysis [C]//Theory of Cryptography Conference. Berlin:Springer, 2006:265-284.
[7]ERLINGSSONÚ, PIHUR V, KOROLOVA A. RAPPOR:randomized aggregatable privacypreserving ordinal response [C]//Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM, 2014:1054-1067.
[8]孟小峰,王雷霞,刘俊旭. 人工智能时代的数据隐私、垄断与公平[J]. 大数据,2020,6(1):35-46.
[9]MACHANAVAJJHALA A, KIFER D, GEHRKE J, et al. L-diversity:privacy beyond k-anonymity [J]. ACM Transactions on Knowledge Discovery from Data (TKDD), 2007, 1 (1):256-267.
[10]LI N, LI T, VENKATASUBRAMANIAN S. T-closeness:privacy beyond k-anonymity and ldiversity [C]//Proceedings of the 23rd International Conference on Data Engineering. Piscataway, NJ:IEEE, 2006:106-115.
[11]XIAO X, TAO Y. M-invariance:towards privacy preserving republication of dynamic datasets [C]//Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data. New York:ACM, 2007:689-700.
[12]GOLDREICH O. Foundations of cryptography:volume 2, basic applications [M]. Cambridge:Cambridge University Press, 2009.
[13]PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes [C]//International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 1999:223-238.
[14]DAMGARD I, GEISLER M, KROIGARD M. Homomorphic encryption and secure comparison[J]. International Journal of Applied Cryptography, 2008, 1 (1):22-31.
[15]WAGH S, HE X, MACHANAVAJJHALA A, et al. DP-cryptography:marrying differential privacy and cryptography in emerging applications [J]. Communications of the ACM, 2021, 64 (2):84-93.
[16]BITTAU A, ERLINGSSONÚ, MANIATIS P, et al. Prochlo:strong privacy for analytics in the crowd [C]//Proceedings of the 26th Symposium on Operating Systems Principles. New York:ACM, 2017:441-459.
[17]YAO A C C. How to generate and exchange secrets [C]//Proceedings of the 27th Annual Symposium on Foundations of Computer Science. Piscataway, NJ:IEEE, 1986:162-167.
[18]DAMGÅRD I, KELLER M, LARRAIA E, et al. Practical covertly secure MPC for dishonest majority-or:breaking the SPDZ limits [C]//European Symposium on Research in Computer Security. Berlin:Springer, 2013:1-18.
[19]MCMAHAN B, MOORE E, RAMAGE D, et al. Communication-efficient learning of deep networks from decentralized data [C]//Artificial Intelligence and Statistics. PMLR, 2017:1273-1282.
[20]孟小峰,刘立新. 基于区块链的数据透明化:问题与挑战[J]. 计算机研究与发展,2021,58(2):237-252.