Efficiently Verifiable Computation on Encrypted Data, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.844-855, 2014. ,
DOI : 10.1145/2660267.2660366
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.455.2271
Verifiable delegation of computation on outsourced data, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.863-874, 2013. ,
DOI : 10.1145/2508859.2516681
Privacy-preserving data mining, ACM SIGMOD Record, vol.29, issue.2, pp.439-450, 2000. ,
DOI : 10.1145/335191.335438
Practical Private Set Intersection Protocols with Linear Complexity, 14th International Conference on Financial Cryptography and Data Security, pp.143-159, 2010. ,
DOI : 10.1007/978-3-642-14577-3_13
Efficient Private Matching and Set Intersection, EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, pp.1-19, 2004. ,
DOI : 10.1007/978-3-540-24676-3_1
Privacy-Preserving Set Operations, CRYPTO 2005, 25th International Cryptology Conference, pp.241-257, 2005. ,
DOI : 10.1007/11535218_15
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model, ASIACRYPT 2010 -16th International Conference on the Theory and Application of Cryptology and Information Security, pp.213-231, 2010. ,
DOI : 10.1007/978-3-642-17373-8_13
When private set intersection meets big data, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.789-800, 2013. ,
DOI : 10.1145/2508859.2516701
Faster private set intersection based on OT extension, 23rd USENIX Security Symposium, 2014. ,
Optimal Verification of Operations on Dynamic Sets, CRYPTO 2011, 31st International Cryptology Conference, pp.91-110, 2011. ,
DOI : 10.1007/978-3-642-22792-9_6
Verifiable Set Operations over Outsourced Databases, 17th IACR International Conference on Theory and Practice of Public-Key Cryptography, pp.113-130, 2014. ,
DOI : 10.1007/978-3-642-54631-0_7
Scaling Private Set Intersection to Billion-Element Sets, 18th International Conference on Financial Cryptography and Data Security, pp.863-874, 2014. ,
DOI : 10.1007/978-3-662-45472-5_13
Collusion-resistant outsourcing of private set intersection, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, pp.1451-1456, 2012. ,
DOI : 10.1145/2245276.2232008
Encrypted Set Intersection Protocol for Outsourced Datasets, 2014 IEEE International Conference on Cloud Engineering, pp.135-140, 2014. ,
DOI : 10.1109/IC2E.2014.18
Outsourced private set intersection using homomorphic encryption, Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS '12, pp.85-86, 2012. ,
DOI : 10.1145/2414456.2414506
Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data, 2015 IEEE International Conference on Cloud Engineering, p.178, 2014. ,
DOI : 10.1109/IC2E.2015.38
The Foundations of Cryptography Basic Applications, 2004. ,
Multi-cloud oblivious storage, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.247-258, 2013. ,
DOI : 10.1145/2508859.2516673
Secure anonymous database search, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, pp.115-126, 2009. ,
DOI : 10.1145/1655008.1655025
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, EU- ROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, pp.223-238, 1999. ,
DOI : 10.1007/3-540-48910-X_16
The Design and Analysis of Computer Algorithms, 1974. ,
Provable data possession at untrusted stores, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.598-609, 2007. ,
DOI : 10.1145/1315245.1315318
Secure and practical outsourcing of linear programming in cloud computing, 2011 Proceedings IEEE INFOCOM, pp.820-828, 2011. ,
DOI : 10.1109/INFCOM.2011.5935305
Searchable Encryption with Secure and Efficient Updates, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.310-320, 2014. ,
DOI : 10.1145/2660267.2660297