共 42 条
[1]
[Anonymous], 2013, ACM CCS 2013, DOI DOI 10.1145/2508859.2516738
[2]
[Anonymous], 2012, IACR CRYPTOLOGY EPRI
[3]
[Anonymous], 2010, USENIX SECURITY 2010
[4]
[Anonymous], 2012, NDSS
[6]
Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation
[J].
2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE,
2010,
:787-796
[7]
Baldi P, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P691
[9]
Camenisch J, 2009, LECT NOTES COMPUT SC, V5628, P108, DOI 10.1007/978-3-642-03549-4_7
[10]
Fast Private Set Intersection from Homomorphic Encryption
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1243-1255

