|
[1]
|
Yao, A.C. (1982) Protocols for Secure Computation. 23rd Annual Symposium on Foundations of Computer Science, Chicago, 3-5 November 1982, 160-164. [Google Scholar] [CrossRef]
|
|
[2]
|
Goldreich, O., Micali, S. and Wigderson, A. (1987) How to Play ANY Mental Game. Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, New York, January 1987, 218-229. [Google Scholar] [CrossRef]
|
|
[3]
|
Goldreich, O. (2004) Foundations of Cryptography II: Basic Applica-tions. Journal of the ACM, 10, 359-364. [Google Scholar] [CrossRef]
|
|
[4]
|
Cristofaro, E.D., Kim, J. and Tsudik, G. (2010) Line-ar-Complexity Private Set Intersection Protocols Secure in Malicious Model. 16th International Conference on the Theo-ry and Application of Cryptology and Information Security, Singapore, 5-9 December 2010, 213-231. [Google Scholar] [CrossRef]
|
|
[5]
|
Jarecki, S. and Liu, X. (2010) Fast Secure Computation of Set Intersection. International Conference on Security & Cryptography for Networks, Amalfi, 13-15 September 2010, 418-435. [Google Scholar] [CrossRef]
|
|
[6]
|
Freedman, M.J., et al. (2016) Efficient Set Intersec-tion with Simulation-Based Security. Journal of Cryptology, 29, 115-155. [Google Scholar] [CrossRef]
|
|
[7]
|
Cristofaro, E.D., Gasti, P. and Tsudik, G. (2012) Fast and Private Computation of Cardinality of Set Intersection and Union. International Conference on Cryptology and Network Security, Darmstadt, 12-14 December 2012, 218-231. [Google Scholar] [CrossRef]
|
|
[8]
|
Pinkas, B., Schneider, T. and Zohner, M. (2018) Scalable Pri-vate Set Intersection Based on OT Extension. ACM Transactions on Privacy and Security, 21, 7:1-7:35. [Google Scholar] [CrossRef]
|
|
[9]
|
Dong, C.Y., Chen, L.Q. and Wen, Z.K. (2013) When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol. Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, 4-8 November 2013, 128-144.
|
|
[10]
|
Kolesnikov, V., et al. (2016) Efficient Batched Oblivious PRF with Applications to Private Set Intersection. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery, New York, 818-829. [Google Scholar] [CrossRef]
|
|
[11]
|
Seo, J.H., Cheon, J.H. and Katz, J. (2012) Constant-Round Mul-ti-Party Private Set Union Using Reversed Laurent Series. International Conference on Practice & Theory in Public Key Cryptography, Darmstadt, 21-23 May 2012, 398-412. [Google Scholar] [CrossRef]
|
|
[12]
|
Blanton, M. and Aguiar, E. (2016) Private and Oblivious Set and Multiset Operations. International Journal of Information Security, 15, 493-518. [Google Scholar] [CrossRef]
|
|
[13]
|
Chun, J.Y., et al. (2013) Privacy-Preserving Disjunctive Normal Form Operations on Distributed Sets. Information Sciences, 231, 113-122. [Google Scholar] [CrossRef]
|
|
[14]
|
Clifton, C., et al. (2002) Tools for Privacy Preserving Distributed Data Mining. ACM SIGKDD Explorations Newsletter, 4, 28-34. [Google Scholar] [CrossRef]
|
|
[15]
|
Pohlig, S. and Hellman, M. (1978) An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance. IEEE Transactions on Information Theory, 24, 106-110. [Google Scholar] [CrossRef]
|
|
[16]
|
Freedman, M.J., Nissim, K. and Pinkas, B. (2004) Efficient Private Matching and Set Intersection. 23rd Annual Eurocrypt Conference, Interlaken, 2-6 May 2004, 1-19. [Google Scholar] [CrossRef]
|
|
[17]
|
Paillier, P. (1999) Public-Key Cryptosystems Based on Com-posite Degree Residuosity Classes. International Conference on the Theory and Application of Cryptographic Tech-niques, Prague, 2-6 May 1999, 223-238.
|
|
[18]
|
Elgamal, T. (1985) A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Trans on Information Theory, 31, 469-472. [Google Scholar] [CrossRef]
|
|
[19]
|
Kissner, L. and Song, D. (2005) Privacy-Preserving Set Operations. In: Shoup, V., Ed., Advances in Cryptology-Crypto’05, Vol. 3621 of LNCS, Springer-Verlag, Berlin, 241-257. [Google Scholar] [CrossRef]
|
|
[20]
|
Xia, F. (2012) Secure Two-Party Computation for Set Intersection and Set Equality Problems Based on LWE. Journal of Electronics & Information Technology, 34, 462-467.
|
|
[21]
|
窦家维, 刘旭红, 王文丽. 有理数域上两方集合的高效保密计算[J]. 计算机学报, 2020, 43(8): 1397-1413.
|
|
[22]
|
巩林明, 等. 基于无匹配差错的PSI计算[J]. 计算机学报, 2020, 43(9): 1769-1790.
|
|
[23]
|
Huang, Y., Evans, D. and Katz, J. (2012) Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? NDSS 2012, San Diego, 5-8 February 2012.
|
|
[24]
|
Pinkas, B., Schneider, T. and Zohner, M. (2014) Faster Private Set Intersection Based on OT Extension. Proceedings of the 23rd USENIX Security, San Diego, 20-22 August 2014, 797-812.
|
|
[25]
|
Lv, S., et al. (2020) Unbal-anced Private Set Intersection Cardinality Protocol with Low Communication Cost. Future Generation Computer Sys-tems, 102, 1054-1061. [Google Scholar] [CrossRef]
|
|
[26]
|
侯晓荣, 杨张. 非线性代数方程组与定理机器证明[M]. 上海: 上海科技教育出版社, 2001.
|
|
[27]
|
Du, W., Han, Y. and Chen, S. (2004) Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification. [Google Scholar] [CrossRef]
|
|
[28]
|
Du, W. and Zhan, Z. (2003) A Practical Approach to Solve Se-cure Multi-Party Computation Problems. Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, 23-26 September 2002, 127-135. [Google Scholar] [CrossRef]
|
|
[29]
|
孙彦飞, 等. 保护私有信息的集合交集协议[J]. 计算机应用, 2010, 30(2): 506-509.
|
|
[30]
|
Tzeng, W. (2001) Efficient Oblivious Transfer Schemes. IACR Cryptology ePrint Archive, 73.
|