共 110 条
[1]
Yao A C., Protocols for secure computations, Proc of the 23rd Annual Symp on Foundations of Computer Science(SFCS 1982), pp. 160-164, (1982)
[2]
Duong T, Phan D, Trieu N., Catalic: Delegated PSI cardinality with applications to contact tracing, Proc of the 26th Int Conf on the Theory and Application of Cryptology and Information Security, pp. 870-899, (2020)
[3]
Demmler D, Rindal P, Rosulek M, Et al., PIR-PSI: Scaling private contact discovery, Proceedings on Privacy Enhancing Technologies, 2018, 4, pp. 159-178, (2018)
[4]
Lv Siyi, Ye Jinhui, Yin Sijie, Et al., Unbalanced private set intersection cardinality protocol with low communication cost, Future Generation Computer Systems, 102, pp. 1054-1061, (2020)
[5]
Shen Liyan, Chen Xiaojun, Wang Dakui, Et al., Efficient and private set intersection of human genomes, Proc of IEEE Int Conf on Bioinformatics and Biomedicine (BIBM'18), pp. 761-764, (2018)
[6]
Meadows C., A more efficient cryptographic matchmaking protocol for use in the absence of a continuously available third party, Proc of the 7th IEEE Symp on Security and Privacy, pp. 134-134, (1986)
[7]
Huberman B, Franklin M, Hogg T., Enhancing privacy and trust in electronic communities, Proc of the 1st ACM Conf on Electronic Commerce, pp. 78-86, (1999)
[8]
Freedman M, Nissim K, Pinkas B., Efficient private matching and set intersection, Proc of the 23rd Int Conf on the Theory and Applications of Cryptographic Techniques, (2004)
[9]
Shen Liyan, Chen Xiaojun, Shi Jinqiao, Et al., Survey on private preserving set intersection technology, Journal of Computer Research and Development, 54, 10, pp. 2153-2169, (2017)
[10]
Shamir A., How to share a secret, Communications of the ACM, 22, 11, pp. 612-613, (1979)