B. Chor, N. Gilboa, and M. Naor, Private information retrieval by keywords. Cryptology ePrint Archive, Report, vol.003, 1998.

E. D. Cristofaro, S. Jarecki, J. Kim, and G. Tsudik, Privacy-Preserving Policy-Based Information Transfer, Privacy Enhancing Technologies, 9th International Symposium, PETS 2009 Proceedings, pp.164-184, 2009.
DOI : 10.1007/978-3-642-03168-7_10

E. D. Cristofaro and G. Tsudik, Practical Private Set Intersection Protocols with Linear Complexity, 14th International Conference, pp.143-159, 2010.
DOI : 10.1007/978-3-642-14577-3_13

E. D. Cristofaro, G. Tsudik, S. Katzenbeisser, E. Weippl, L. J. Camp et al., Experimenting with Fast Private Set Intersection, Trust and Trustworthy Computing -5th International Conference Proceedings, volume 7344 of Lecture Notes in Computer Science, pp.55-73, 2012.
DOI : 10.1007/978-3-642-30921-2_4

E. D. Cristofaro and G. Tsudik, On the performance of certain private set intersection protocols, Cryptology ePrint Report, vol.54, 2012.

S. Even, O. Goldreich, and A. Lempel, A randomized protocol for signing contracts, Communications of the ACM, vol.28, issue.6, pp.637-647, 1985.
DOI : 10.1145/3812.3818

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.98.7448

M. J. Freedman, K. Nissim, and B. Pinkas, Efficient Private Matching and Set Intersection, Advances in Cryptology - EUROCRYPT 2004, pp.1-19, 2004.
DOI : 10.1007/978-3-540-24676-3_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.931

S. Hohenberger and S. A. Weis, Honest-Verifier Private Disjointness Testing Without Random Oracles, Privacy Enhancing Technologies ? PET 2006, pp.277-294, 2006.
DOI : 10.1007/11957454_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.8270

Y. Huang, D. Evans, and J. Katz, Private set intersection: Are garbled circuits better than custom protocols, NDSS 2012, Proceedings. IEEE, 2012.

A. Juels and M. Wattenberg, A fuzzy commitment scheme, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.28-36, 1999.
DOI : 10.1145/319709.319714

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.763

A. Kiayias and A. Mitrofanova, Testing Disjointness of Private Datasets, Financial Cryptography and Data Security ? FC 2005, pp.109-124, 2005.
DOI : 10.1007/11507840_13

N. Li, W. Du, and D. Boneh, Oblivious signature-based envelope, Distributed Computing, vol.6, issue.4, pp.293-302, 2005.
DOI : 10.1007/s00446-004-0116-1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.8946

M. Naor and B. Pinkas, Oblivious Transfer with Adaptive Queries, Advances in Cryptology -CRYPTO '99, pp.573-590, 1999.
DOI : 10.1007/3-540-48405-1_36

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.46.971

M. Narasimha, J. Solis, and G. Tsudik, Privacy-preserving revocation checking, International Journal of Information Security, vol.18, issue.4, pp.61-75, 2009.
DOI : 10.1007/s10207-008-0064-z

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.184.4448

S. Nasserian and G. Tsudik, Revisiting Oblivious Signature-Based Envelopes, Financial Cryptography and Data Security , 10th International Conference, pp.221-235, 2006.
DOI : 10.1007/11889663_19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.5948

W. Ogata and K. Kurosawa, Oblivious keyword search, Journal of Complexity, vol.20, issue.2-3, pp.356-371, 2004.
DOI : 10.1016/j.jco.2003.08.023

URL : http://doi.org/10.1016/j.jco.2003.08.023

J. Solis and G. Tsudik, Simple and Flexible Revocation Checking with Privacy, Proceedings of the 6th international conference on Privacy Enhancing Technologies, PET'06, pp.351-367, 2006.
DOI : 10.1007/11957454_20

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.2384

Q. Ye, H. Wang, J. Pieprzyk, and X. Zhang, Efficient Disjointness Tests for Private Datasets, 13th Australasian Conference Information Security and Privacy ? ACISP, pp.155-169, 2008.
DOI : 10.1007/978-3-540-70500-0_12

Q. Ye, H. Wang, J. Pieprzyk, and X. Zhang, Unconditionally secure disjointness tests for private datasets, International Journal of Applied Cryptography, vol.1, issue.3, pp.225-235, 2009.
DOI : 10.1504/IJACT.2009.023471