共 57 条
[1]
Agrawal R, 2003, P 2003 ACM SIGMOD IN, P86, DOI DOI 10.1145/872757.872771
[2]
[Anonymous], About us
[3]
[Anonymous], About us
[4]
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I,
2015, 9056
:673-701
[5]
Bernstein DJ, 2006, LECT NOTES COMPUT SC, V3958, P207
[6]
Bienstock A, 2023, PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, P301
[7]
BONEH D., 2001, Lecture Notes Comput. Sci., V2248, P514, DOI [10.1007/3-540-45682-130, DOI 10.1007/3-540-45682-130]
[8]
Private Set Intersection in the Internet Setting from Lightweight Oblivious PRF
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT III,
2020, 12172
:34-63
[9]
Labeled PSI from Fully Homomorphic Encryption with Malicious Security
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:1223-1237
[10]
Fast Private Set Intersection from Homomorphic Encryption
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1243-1255