[1] |
YAO A C.Protocols for Secure Computations[C]//IEEE. 23rd Annual Symposium on Foundations of Computer Science, November 3-5, 1982, Chicago, IL, USA. NJ: IEEE, 1982: 160-164.
|
[2] |
BENOR M, GOLDWASSER S, WIGDERSON A, et al.Completeness Theorems for Non-cryptographic Fault-tolerant Distributed Computation[C]//ACM. The Twentieth Annual ACM Symposium on Theory of Computing, May 2- 4, 1988, Chicago, Illinois, USA. New York: ACM, 1988: 1-10.
|
[3] |
FREEDMAN M J, NISSIM K, PINKAS B, et al.Efficient Private Matching and Set Intersection[M]//Springer. Advances in Cryptology- Eurocrypt 2004. Heidelberg: Springer, Berlin, 2004: 1-19.
|
[4] |
KISSNER L, SONG D. Privacy-preserving Set Operations[EB/OL]. , 2019-6-30.
|
[5] |
DONG Changyu, CHEN Liqun, WEN Zikai, et al.When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol[C]//ACM. The 2013 ACM SIGSAC Conference on Computer & Communications security, November 4- 8, 2013, Berlin, Germany. New York: ACM, 2013: 789-800.
|
[6] |
PINKAS B, SCHNEIDER T, ZOHNER M.Faster Private Set Intersection Based on OT Extension[C]// USENIX. The 23rd USENIX Conference on Security Symposium, August 20-22, 2014, San Diego, CA. Berkeley: USENIX Association, 2014: 797-812.
|
[7] |
CHEN Zhenhua, LI Shundong, HUANG Qiong, et al.Protocols for Secure Computation of Two Set-relationships with the Nnencrypted Method[J]. Journal of Software, 2018, 29(2): 473-482.
|
|
陈振华,李顺东,黄琼,等.非加密方法安全计算两种集合关系[J].软件学报,2018, 29(2):473-482.
|
[8] |
ZHOU Sufang, LI Shundong, GUO Yiming, et al.Efficient Set Intersection Problem Computation[J]. Chinese Journal of Computers, 2018, 41(2): 464-480.
|
|
周素芳,李顺东,郭奕旻,等.保密集合相交问题的高效计算[J].计算机学报,2018,41(2):464-480.
|
[9] |
DOU Jiawei, LIU Xuhong, ZHOU Sufang, et al.Efficient Protocol and Application of Secure Multi-party Set Computation[J]. Chinese Journal of Computers, 2018, 41(8): 1844-1860.
|
|
窦家维,刘旭红,周素芳,等.高效的集合安全多方计算协议及应用[J].计算机学报,2018,41(8):1844-1860.
|
[10] |
HAZAY C, NISSIM K.Efficient Set Operations in the Presence of Malicious Adversaries[J]. Journal of Cryptography, 2012, 25(3): 383-433.
|
[11] |
FREEDMAN M J, HAZAY C, NISSIM K, et al.Efficient Set Intersection with Simulation-Based Security[J]. Journal of Cryptology, 2016, 29(1): 115-155.
|
[12] |
DACHMANSOLED D, MALKIN T, RAYKOVA M, et al.Efficient Robust Private Set Intersection[M]//Springer. Applied Cryptography and Network Security. Heidelberg: Springer, Berlin, 2009: 125-142.
|
[13] |
DONG Changyu, CHEN Liqun, CAMENISCH J, et al.Fair Private Set Intersection with a Semi-trusted Arbiter[M]//Springer. Data and Applications Security and Privacy XXVII. Heidelberg: Springer, Berlin, 2013: 128-144.
|
[14] |
LIU Fang, NG W K, ZHANG Wei, et al.Encrypted Set Intersection Protocol for Outsourced Datasets[C]//IEEE. 2014 IEEE International Conference on Cloud Engineering, March 11-14, 2014, Boston, MA, USA. NJ: IEEE, 2014: 35-140.
|
[15] |
PAILLIER P.Public-key Cryptosystems Based on Composite Degree Residuosity Classes[C]//Springer. The 17th International Conference on Theory and Application of Cryptographic Techniques, May 2-6, 1999, Prague, Czech Republic. Heidelberg: Springer-Verlag Berlin, 1999: 223-238.
|
[16] |
OEDE G.Foundations of Cryptography Volume 2: Basic Applications[J]. Foundations of Cryptography, 2009, 2(1): 1-14.
|