共 33 条
- [1] Benaloh J., 1994, Pieces of the puzzle: the jigsaw method. Penn State University, P120
- [3] Chase M., 2015, PoPETs, P263
- [4] Homomorphic Computation of Edit Distance [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8976 : 194 - 212
- [5] Efficient Cryptanalysis of Bloom Filters for Privacy-Preserving Record Linkage [J]. ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2017, PT I, 2017, 10234 : 628 - 640
- [6] Coron JS, 2011, LECT NOTES COMPUT SC, V6571, P147, DOI 10.1007/978-3-642-19379-8_9
- [7] Damgård I, 2007, LECT NOTES COMPUT SC, V4586, P416
- [8] De Cristofaro E, 2012, INT C CRYPT NETW SEC, P218, DOI [DOI 10.1007/978-3-642-35404-5_17, DOI 10.1007/978-3-642-35404-517]