共 50 条
- [42] Malicious-Secure Private Set Intersection via Dual Execution CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1229 - 1242
- [44] PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 1098 - 1112
- [45] Quantum Secure Multi-party Private Set Intersection Cardinality International Journal of Theoretical Physics, 2020, 59 : 1992 - 2007
- [46] Efficient Privacy Preserving Reputation Protocols Inspired by Secure Sum PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 126 - 133
- [47] Efficient Unbalanced Private Set Intersection Cardinality and User-friendly Privacy-preserving Contact Tracing PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 283 - 300
- [48] An Efficient Private Set Intersection Protocol for the Cloud Computing Environments 2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 254 - 259
- [49] Private and Efficient Set Intersection Protocol for Big Data Analytics ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017, 2017, 10393 : 149 - 164
- [50] Element Distinctness and Bounded Input Size in Private Set Intersection and Related Protocols APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT I, 2024, 14583 : 26 - 57