共 13 条
- [1] YAO A C., Protocols for secure computations, The 23rd IEEE Annual Symposium on Foundations of Computer Science, pp. 160-164, (1982)
- [2] BEN-OR M, GOLDWASSER S, WIGDERSON A., Completeness theorems for non-cryptographic fault-tolerant distributed computation, The 20th Annual ACM Symposium on Theory of Computing, pp. 1-10, (1988)
- [3] GOLDREICH O., The Fundamental of Cryptography- Volume: Basic Applications, (2004)
- [4] BALDI P, BARONIO R, CRISTOFARO E D, Et al., Countering gattaca: Efficient and secure testing of fully-sequenced human genomes, The 18th ACM Conference on Computer And Communications Security, pp. 691-702, (2011)
- [5] BLUNDO C, CRISTOFARO E D, GASTI P., EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity, Journal of Computer Security, 22, 3, pp. 355-381, (2014)
- [6] YAN H, CHAPMAN P, EVANS D., Privacy-preserving applications on smartphones, The 6th USENIX Workshop on Hot Topics in Security, (2011)
- [7] ZHANG E, CHANG J, LI Y., Efficient threshold private set intersection, IEEE Access, 9, pp. 6560-6570, (2021)
- [8] ION M, KREUTER B, NERGIZ A E, Et al., Private intersection-sum protocol with applications to attributing aggregate ad conversions, IACR Cryptology ePrint Archive, (2017)
- [9] ION M, KREUTER B, NERGIZ A E, Et al., On deploying secure computing: Private intersection-sum with cardinality, IEEE European Symposium on Security and Privacy, pp. 370-389, (2020)
- [10] MIAO P, PATEL S, RAYKOVARM, Et al., Two-sided malicious security for private intersection-sum with cardinality, 40th Annual International Cryptology Conference, pp. 3-33, (2020)