共 34 条
- [1] Adam Groce, 2019, IACR CRYPTOL EPRINT, V2019, P239
- [2] Agrawal R., 2003, ACM SIGMOD 2003, P86, DOI DOI 10.1145/872757.872771
- [3] Bendlin R, 2010, LECT NOTES COMPUT SC, V5978, P201, DOI 10.1007/978-3-642-11799-2_13
- [5] Cerulli Andrea, 2018, Applied Cryptography and Network Security. 16th International Conference, ACNS 2018. Proceedings: LNCS 10892, P280, DOI 10.1007/978-3-319-93387-0_15
- [6] Fast Private Set Intersection from Homomorphic Encryption [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1243 - 1255
- [8] Combining Private Set-Intersection with Secure Two-Party Computation [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 464 - 482
- [9] Dachman-Soled D, 2011, LECT NOTES COMPUT SC, V6715, P130, DOI 10.1007/978-3-642-21554-4_8
- [10] De Cristofaro E., 2012, LNCS, V7344, P55, DOI [DOI 10.1007/978-3-642-30921-24, DOI 10.1007/978-3-642-30921-2_4]