[1] 申立艳, 陈小军, 时金桥, 等. 隐私保护集合交集计算技术研究综述[J]. 计算机研究与发展, 2017, 54(10):2153-2169. Shen L Y, Chen X J, Shi J Q, et al. Survey on private preserving set intersection technology[J]. Journal of Computer Research and Development, 2017, 54(10):2153-2169.
[2] Abadi A, Terzis S, Dong C. O-PSI:delegated private set intersection on outsourced datasets[C]//IFIP International Information Security Conference.[S.l.]:Springer,2015:3-17.
[3] Kissner L, Song D. Privacy-preserving set operations[C]//International Conference on Advances in Cryptology.[S.l.]:Springer-Verlag, 2005:241-257.
[4] Abadi A, Terzis S, Dong C. VD-PSI:verifiable delegated private set intersection on outsourced private datasets[C]//International Conference on Financial Cryptography and Data Security. Berlin:Springer, 2016:149-168.
[5] 李顺东, 周素芳, 郭奕旻, 等. 云环境下集合隐私计算[J]. 软件学报, 2016, 27(6):1549-1565. Li S D, Zhou S F, Guo Y M, et al. Secure set computing in cloud environment[J]. Journal of Software, 2016, 27(6):1549-1565.
[6] Boneh D, Goh E J, Nissim K. Evaluating 2-DNF formulas on ciphertexts[C]//Theory of Cryptography Conference. Berlin:Springer, 2005:325-341.
[7] Kissner L, Song D. Privacy-preserving set operations[C]//International Conference on Advances in Cryptology.[S.l.]:Springer-Verlag, 2005:241-257. |