[1]Chor B, Kushilevitz E, Goldreich O, et al. Private information retrieval[J]. Journal of the ACM, 1998, 45(6): 965981[2]Zhou R, Tian C, Sun H, et al. Twolevel private information retrieval[J]. IEEE Journal on Selected Areas in Inf Theory, 2022, 3(2): 337349[3]Shi E, Aqeel W, Chandrasekaran B, et al. Puncturable pseudorandom sets and private information retrieval with nearoptimal online bandwidth and time[C] Proc of the 41st Annual Int Cryptology Conf. Berlin: Springer, 2021: 641669[4]Canetti R, Holmgren J, Richelson S. Towards doubly efficient private information retrieval[C] Proc of the 15th Theory of Cryptography Conf. Berlin: Springer, 2017: 694726[5]Ali A, Pasha M F, Fang O H, et al. Big Data Intelligence for Smart Applications[M]. Berlin: Springer, 2022: 279296[6]Heidarzadeh A, Sprintson A. Singleserver individuallyprivate information retrieval: A combinatorial approach[C] Proc of IEEE Information Theory Workshop (ITW). Piscataway, NJ: IEEE, 2021: 16[7]Gilboa N, Ishai Y. Distributed point functions and their applications. [C] Proc of the 33rd Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2014: 640658[8]Eskandarian S, CorriganGibbs H, Zaharia M, et al. Express: Lowering the cost of metadatahiding communication with cryptographic privacy[C] Proc of the 30th USENIX Security Symp (USENIX Security 21). Berkeley, CA: USENIX Association, 2021: 17751792[9]Boyle E, Gilboa N, Ishai Y, et al. Informationtheoretic distributed point functions[C] Proc of the 3rd Conf on InformationTheoretic Cryptography (ITC 2022). Cambridge, MA: Dagstuhl Publishing, 2022[10]Newman Z, ServanSchreiber S, Devadas S. Spectrum: Highbandwidth anonymous broadcast[C] Proc of the 19th USENIX Symp on Networked Systems Design and Implementation (NSDI 22). Berkeley, CA: USENIX Association, 2022: 229248[11]吴艳辉, 王伟平, 陈建二. 匿名通信研究综述[J]. 小型微型计算机系统, 2007, 28(4): 583588[12]Chaum D L. Untraceable electronic mail, return addresses, and digital pseudonyms[J]. Communications of the ACM, 1981, 24(2): 8490[13]胡德敏, 詹涵. 差分扰动的均衡增量近邻查询位置隐私保护方法[J]. 小型微型计算机系统, 2018, 39(7): 14831485[14]Pizzio R, UchaFilho B F, Di Renzo M, et al. Generalized spatial modulation for downlink multiuser MIMO systems with multicast[C] Proc of the 27th Annual Int Symp on Personal, Indoor, and Mobile Radio Communications (PIMRC). Piscataway, NJ: IEEE, 2016: 16[15]邓密文. 融合边信息的双重匿名位置隐私保护方案[J]. 信息安全研究, 2020, 6(5): 421426[16]何明星, 李鹏程, 李虓. 高效的可证明安全的无证书数字签名方案[J]. 电子科技大学学报, 2015, 44(6): 887891 [17]熊金波, 王敏燊, 田有亮, 等. 面向云数据的隐私度量研究进展[J]. 软件学报, 2018, 29(7): 19631980[18]谢永, 吴黎兵, 张宇波, 等. 面向车联网的多服务器架构的匿名双向认证与密钥协商协议[J]. 计算机研究与发展, 2016, 53(10): 23232333[19]杨阳,李晓宇.基于匿名通信的在线匿名秘密举报方案[J]. 计算机工程, 2022, 48(5): 118126[20]张瑞丽, 李顺东. 一种新的基于身份的匿名电子举报方案[J]. 计算机应用与软件, 2015, 32(2): 288290[21] Nayir D Z, Herzig C. Value orientations as determinants of preference for external and anonymous whistleblowing[J]. Journal of Business Ethics, 2012, 107(2): 197213[22]Hunton J E, Rose J M. Retracted: Effects of anonymous whistleblowing and perceived reputation threats on investigations of whistleblowing allegations by audit committee members[J]. Journal of Management Studies, 2011, 48(1): 7598[23]Eshghi S, Tassiulas L. Whistleblowing games in networks[C] Proc of the 57th IEEE Conf on Decision and Control (CDC 2018). Piscataway, NJ: IEEE, 2018: 43904396
|