B. H. Bloom, Space/time trade-os in hash coding with allowable errors, vol.13, p.422426, 1970.
DOI : 10.1145/362686.362692

URL : http://www.ovmj.org/GNUnet/papers/p422-bloom.pdf

A. Z. Broder and M. Mitzenmacher, Survey: Network Applications of Bloom Filters: A Survey, Internet Mathematics, vol.1, issue.4, p.485509, 2003.
DOI : 10.1080/15427951.2004.10129096

URL : http://www.internetmathematicsjournal.com/article/1393.pdf

,

C. Dong and L. Chen, A Fast Secure Dot Product Protocol with Application to Privacy Preserving Association Rule Mining, Advances in Knowledge Discovery and Data Mining-18th Pacic-Asia Conference, p.606617, 2014.

C. Dong, L. Chen, and Z. Wen, When private set intersection meets big data: an ecient and scalable protocol, 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, p.789800, 2013.

E. Ghosh, O. Ohrimenko, D. Papadopoulos, R. Tamassia, and N. Triandopoulos, Zero-Knowledge Accumulators and Set Algebra, Advances in Cryptology-ASIACRYPT 2016-22nd International Conference on the Theory and Application of Cryptology and Information Security, p.67100, 2016.

J. Katz and Y. Lindell, Introduction to Modern Cryptography, 2014.

A. Kiss, J. Liu, T. Schneider, N. Asokan, and B. Pinkas, Private Set Intersection for Unequal Set Sizes with Mobile Applications. IACR Cryptology ePrint Archive, vol.670, 2017.

M. Lambaek, Breaking and Fixing Private Set Intersection Protocols. IACR Cryptology ePrint Archive, vol.665, 2016.

M. Lentz, V. Erdélyi, P. Aditya, E. Shi, P. Druschel et al., SDDR: Light-Weight, Secure Mobile Encounters, Proceedings of the 23rd USENIX Security Symposium, p.925940, 2014.

C. Patsakis, A. Zigomitros, and A. Solanas, Privacy-Aware Genome Mining: Server-Assisted Protocols for Private Set Intersection and Pattern Matching, 28th IEEE International Symposium on Computer-Based Medical Systems, p.276279, 2015.

,

B. Pinkas, T. Schneider, and M. Zohner, Faster private set intersection based on OT extension, Proceedings of the 23rd USENIX Security Symposium, pp.797-812, 2014.

P. Rindal and M. Rosulek, Improved Private Set Intersection Against Malicious Adversaries, Advances in Cryptology-EUROCRYPT 2017-36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, p.235259, 2017.

C. V. Rompay, R. Molva, and M. Önen, Secure and scalable multi-user searchable encryption, 2018.

X. S. Wang, Y. Huang, Y. Zhao, H. Tang, X. Wang et al., Ecient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, p.492503, 2015.

Z. Wen and C. Dong, Ecient protocols for private record linkage, Symposium on Applied Computing, p.16881694, 2014.

Y. Zhao and S. S. Chow, Are you The One to Share? Secret Transfer with Access Structure, PoPETs, vol.2017, issue.1, p.149169, 2017.
DOI : 10.1515/popets-2017-0010

URL : https://content.sciendo.com/downloadpdf/journals/popets/2017/1/article-p149.pdf

Q. Zheng and S. Xu, Veriable Delegated Set Intersection Operations on Outsourced Encrypted Data, 2015 IEEE International Conference on Cloud Engineering, IC2E 2015, p.175184, 2015.
DOI : 10.1109/ic2e.2015.38

URL : https://eprint.iacr.org/2014/178.pdf

,