共 21 条
- [11] Li R.H., Wu C.K., Zhang Y.Q., Secure computation protocols for testing the inclusion relation of sets, Chinese Journal of Computers, 32, 7, pp. 1337-1346, (2009)
- [12] Freedman M.J., Nissim K., Pinkas B., Efficient private matching and set intersection, Proc. of the EuroCrypt 2004, pp. 1-19, (2004)
- [13] Paillier P., Public-Key cryptosystems based on composite degree residue classes, Proc. of the EuroCrypt'99, pp. 223-238, (1999)
- [14] Xia F., Yang B., Zhang M., Ma S., Lei T., Secure two-party computation for set intersection and set equality problems based on LWE, Journal of Electronics & Information Technology, 34, 2, pp. 462-467, (2012)
- [15] Kissner L., Song D., Privacy-Preserving set operations, Proc. of the Crypt 2005, pp. 241-257, (2005)
- [16] Li S.D., Zhou S.F., Guo Y.M., Dou J.W., Wang D.S., Secure set computing on cloud computing, Ruan Jian Xue Bao/Journal of Software, 27, 6, (2016)
- [17] Elgamal T., A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. on Information Theory, 31, 4, pp. 469-472, (1985)
- [18] Goldwasser S., Micali S., Probabilistic encryption, Journal of Computer and Systems Science, 28, 2, pp. 270-299, (1984)
- [19] Shamir A., How to share a secret, Communications of the ACM, 22, 11, pp. 612-613, (1979)
- [20] Goldreich O., Foundations of Cryptography: Baisc Applications, 2, pp. 599-729, (2004)