|
[1]
|
Meadows, C. (1986) A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party. 1986 IEEE Symposium on Security and Privacy, Oakland, 7-9 April 1986, 134-134. [Google Scholar] [CrossRef]
|
|
[2]
|
Huang, Y., Evans, D. and Katz, J. (2012) Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?
|
|
[3]
|
Pinkas, B., Schneider, T., Weinert, C., et al. (2018) Efficient Circuit-Based PSI via Cuckoo Hashing. 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, 29 April-3 May 2018, 125-157. [Google Scholar] [CrossRef]
|
|
[4]
|
Dong, C., Chen, L. and Wen, Z. (2013) When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol. Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, 4-8 November 2013, 789-800. [Google Scholar] [CrossRef]
|
|
[5]
|
Kolesnikov, V. and Kumaresan, R. (2013) Improved OT Extension for Transferring Short Secrets. 33rd Annual Cryptology Conference, Santa Barbara, 18-22 August 2013, 54-70. [Google Scholar] [CrossRef]
|
|
[6]
|
Yang, K., Weng, C., Lan, X., et al. (2020) Ferret: Fast Extension for Correlated OT with Small Communication. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 9-13 November 2020, 1607-1626. [Google Scholar] [CrossRef]
|
|
[7]
|
Freedman, M.J., Nissim, K. and Pinkas, B. (2004) Efficient Private Matching and Set Intersection. Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, 2-6 May 2004, 1-19. [Google Scholar] [CrossRef]
|
|
[8]
|
Vos, J., Conti, M. and Erkin, Z. (2022) Fast Multi-Party Private Set Operations in the Star Topology from Secure ANDs and ORs. Cryptology ePrint Archive.
|
|
[9]
|
Sang, Y. and Shen, H. (2007) Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors. 8th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007), Adelaide, 3-6 December 2007. 461-468. [Google Scholar] [CrossRef]
|
|
[10]
|
Kamara, S., Mohassel, P., Raykova, M., et al. (2014) Scaling Private Set Intersection to Billion-Element Sets. Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, 3-7 March 2014, 195-215. [Google Scholar] [CrossRef]
|
|
[11]
|
Baldi, P., Baronio, R., De Cristofaro, E., et al. (2011) Countering Gattaca: Efficient and Secure Testing of Fully-Sequenced Human Genomes. Proceedings of the 18th ACM Conference on Computer and Communications Security, Chicago, 17-21 October 2011, 691-702. [Google Scholar] [CrossRef]
|
|
[12]
|
魏立斐, 刘纪海, 张蕾. 面向隐私保护的集合交集计算综述[J]. 计算机研究与发展, 2022, 59(8): 1782-1799.
|
|
[13]
|
Yang, G., Tan, C.H., Huang, Q., et al. (2010) Probabilistic Public Key Encryption with Equality Test. Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA Conference 2010, San Francisco, 1-5 March 2010, 119-131. [Google Scholar] [CrossRef]
|
|
[14]
|
Tang, Q. (2011) Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization. Information Security and Privacy: 16th Australasian Conference, ACISP 2011, Melbourne, 11-13 July 2011, 389-406. [Google Scholar] [CrossRef]
|
|
[15]
|
Ma, S., Zhong, Y. and Huang, Q. (2022) Efficient Public Key Encryption with Outsourced Equality Test for Cloud-Based IoT Environments. IEEE Transactions on Information Forensics and Security, 17, 3758-3772. [Google Scholar] [CrossRef]
|
|
[16]
|
Xu, Y., Wang, M., Zhong, H., et al. (2017) Verifiable Public Key Encryption Scheme with Equality Test in 5G Networks. IEEE Access, 5, 12702-12713. [Google Scholar] [CrossRef]
|
|
[17]
|
Wang, Y., Huang, Q., Li, H., et al. (2021) Private Set Intersection with Authorization over Outsourced Encrypted Datasets. IEEE Transactions on Information Forensics and Security, 16, 4050-4062. [Google Scholar] [CrossRef]
|
|
[18]
|
Kissner, L. and Song, D. (2005) Privacy-Preserving Set Operations. 25th Annual International Cryptology Conference, Santa Barbara, 14-18 August 2005, 241-257. [Google Scholar] [CrossRef]
|
|
[19]
|
Hazay, C. and Venkitasubramaniam, M. (2017) Scalable Multi-Party Private Set-Intersection. 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, 28-31 March 2017, 175-203. [Google Scholar] [CrossRef]
|
|
[20]
|
Bay, A., Erkin, Z., Alishahi, M., et al. (2021) Multi-Party Private Set Intersection Protocols for Practical Applications. Proceedings of the 18th International Conference on Security and Cryptography SECRYPT, 1, 515-522. [Google Scholar] [CrossRef]
|