[1] YAO A.Protocols for Secure Computations [R].Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science.1982.[2] GOLDERICH O,MICALI S,WIGDERSON A.How to Play Any Mental Game [R].Proceedings of the Nineteenth Anuual ACM Symposium on Theory of Computing.[3] GOLDREICH O.Secure Multi-party Computation [EB/OL].http://www.wisdom.weizmann.ac.il/~oded/pp.html,2001.[4] LINDELL Y.On the Composition of Secure Multi-Party Protocols [D].Department of Computer Science and Applied Mathematics,The Weizmann Institiute of Science,Israel,2002.http://www.research.ibm.com/people/l/lindell//,html,2002.[5] CACHIN C,MICALI S,STADLER M.Computationally Private Information Retrieval With Polyogarithmic Communication [M].Advances in cryptology: EUROCRYPT 1999,Lecture Notes in computer,1998.308-318.[6] CHOR B,GILBOA N.Computationally Private Information Retrieval (Extended Abstract) [R].Proceedings of Twenty-ninth ACM Symposium on Theory of Computing,El Paso,Texas,USA,1997.[7] CHOR B,GILBOA N,NAOR M.Private Information Retrieval by Keywords [R].Technical Report TR CS0917,Department of Computer Science,Technion,1997.[8] DU Wen-liang.A Study of Several Specific Secure Two-Party Computation Problems[D].htttp://www.cis.edu/~wedu/Research/publication.html,2000.[9] DU Wen-liang,MIKHAIL J,ATALLAH.Privacy-Preserving Cooperative Scientific Computations [R].14th IEEE Computer Security Foundations Workshop,Nova Scotia,Canada,2001.[10] NAOR M,PINKAS B.Efficient Oblivious Transfer Protocols[R].Proceedings of SODA 2001(SIAM Symposium on Discrete Algorithms),Washington DC,2001.[11] NAOR M,PINKAS B.Distributed Oblivious Transfer[A].Advances in Cryptology:Asiacrypt ’00 Proceedings,LNCS 1976,Springer-Verlag[C].2000.200-219.[12] NAOR M,PINKAS B.Oblivious Transfer With Adaptive Queries [A].Advances in Cryptology:Crypto ’99 Proceedings,Lncs 1666,springer-Veringer [C].1999.573-590.[13] NAOR M,PINKAS B.Oblivious Transfer and Polynomial Evaluation,Proc[R].Of the 31st Symp.On Theory of Computer Science(STOC),Atlant,GA.