Private information retrieval by keywords. Cryptology ePrint Archive, Report, vol.003, 1998. ,
Privacy-Preserving Policy-Based Information Transfer, Privacy Enhancing Technologies, 9th International Symposium, PETS 2009 Proceedings, pp.164-184, 2009. ,
DOI : 10.1007/978-3-642-03168-7_10
Practical Private Set Intersection Protocols with Linear Complexity, 14th International Conference, pp.143-159, 2010. ,
DOI : 10.1007/978-3-642-14577-3_13
Experimenting with Fast Private Set Intersection, Trust and Trustworthy Computing -5th International Conference Proceedings, volume 7344 of Lecture Notes in Computer Science, pp.55-73, 2012. ,
DOI : 10.1007/978-3-642-30921-2_4
On the performance of certain private set intersection protocols, Cryptology ePrint Report, vol.54, 2012. ,
A randomized protocol for signing contracts, Communications of the ACM, vol.28, issue.6, pp.637-647, 1985. ,
DOI : 10.1145/3812.3818
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.98.7448
Efficient Private Matching and Set Intersection, Advances in Cryptology - EUROCRYPT 2004, pp.1-19, 2004. ,
DOI : 10.1007/978-3-540-24676-3_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.931
Honest-Verifier Private Disjointness Testing Without Random Oracles, Privacy Enhancing Technologies ? PET 2006, pp.277-294, 2006. ,
DOI : 10.1007/11957454_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.8270
Private set intersection: Are garbled circuits better than custom protocols, NDSS 2012, Proceedings. IEEE, 2012. ,
A fuzzy commitment scheme, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.28-36, 1999. ,
DOI : 10.1145/319709.319714
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.763
Testing Disjointness of Private Datasets, Financial Cryptography and Data Security ? FC 2005, pp.109-124, 2005. ,
DOI : 10.1007/11507840_13
Oblivious signature-based envelope, Distributed Computing, vol.6, issue.4, pp.293-302, 2005. ,
DOI : 10.1007/s00446-004-0116-1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.8946
Oblivious Transfer with Adaptive Queries, Advances in Cryptology -CRYPTO '99, pp.573-590, 1999. ,
DOI : 10.1007/3-540-48405-1_36
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.46.971
Privacy-preserving revocation checking, International Journal of Information Security, vol.18, issue.4, pp.61-75, 2009. ,
DOI : 10.1007/s10207-008-0064-z
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.184.4448
Revisiting Oblivious Signature-Based Envelopes, Financial Cryptography and Data Security , 10th International Conference, pp.221-235, 2006. ,
DOI : 10.1007/11889663_19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.5948
Oblivious keyword search, Journal of Complexity, vol.20, issue.2-3, pp.356-371, 2004. ,
DOI : 10.1016/j.jco.2003.08.023
URL : http://doi.org/10.1016/j.jco.2003.08.023
Simple and Flexible Revocation Checking with Privacy, Proceedings of the 6th international conference on Privacy Enhancing Technologies, PET'06, pp.351-367, 2006. ,
DOI : 10.1007/11957454_20
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.2384
Efficient Disjointness Tests for Private Datasets, 13th Australasian Conference Information Security and Privacy ? ACISP, pp.155-169, 2008. ,
DOI : 10.1007/978-3-540-70500-0_12
Unconditionally secure disjointness tests for private datasets, International Journal of Applied Cryptography, vol.1, issue.3, pp.225-235, 2009. ,
DOI : 10.1504/IJACT.2009.023471