, Space/time trade-os in hash coding with allowable errors, vol.13, p.422426, 1970.
DOI : 10.1145/362686.362692
URL : http://www.ovmj.org/GNUnet/papers/p422-bloom.pdf
Survey: Network Applications of Bloom Filters: A Survey, Internet Mathematics, vol.1, issue.4, p.485509, 2003. ,
DOI : 10.1080/15427951.2004.10129096
URL : http://www.internetmathematicsjournal.com/article/1393.pdf
,
A Fast Secure Dot Product Protocol with Application to Privacy Preserving Association Rule Mining, Advances in Knowledge Discovery and Data Mining-18th Pacic-Asia Conference, p.606617, 2014. ,
When private set intersection meets big data: an ecient and scalable protocol, 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, p.789800, 2013. ,
Zero-Knowledge Accumulators and Set Algebra, Advances in Cryptology-ASIACRYPT 2016-22nd International Conference on the Theory and Application of Cryptology and Information Security, p.67100, 2016. ,
Introduction to Modern Cryptography, 2014. ,
Private Set Intersection for Unequal Set Sizes with Mobile Applications. IACR Cryptology ePrint Archive, vol.670, 2017. ,
Breaking and Fixing Private Set Intersection Protocols. IACR Cryptology ePrint Archive, vol.665, 2016. ,
SDDR: Light-Weight, Secure Mobile Encounters, Proceedings of the 23rd USENIX Security Symposium, p.925940, 2014. ,
Privacy-Aware Genome Mining: Server-Assisted Protocols for Private Set Intersection and Pattern Matching, 28th IEEE International Symposium on Computer-Based Medical Systems, p.276279, 2015. ,
,
Faster private set intersection based on OT extension, Proceedings of the 23rd USENIX Security Symposium, pp.797-812, 2014. ,
Improved Private Set Intersection Against Malicious Adversaries, Advances in Cryptology-EUROCRYPT 2017-36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, p.235259, 2017. ,
Secure and scalable multi-user searchable encryption, 2018. ,
Ecient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, p.492503, 2015. ,
Ecient protocols for private record linkage, Symposium on Applied Computing, p.16881694, 2014. ,
Are you The One to Share? Secret Transfer with Access Structure, PoPETs, vol.2017, issue.1, p.149169, 2017. ,
DOI : 10.1515/popets-2017-0010
URL : https://content.sciendo.com/downloadpdf/journals/popets/2017/1/article-p149.pdf
Veriable Delegated Set Intersection Operations on Outsourced Encrypted Data, 2015 IEEE International Conference on Cloud Engineering, IC2E 2015, p.175184, 2015. ,
DOI : 10.1109/ic2e.2015.38
URL : https://eprint.iacr.org/2014/178.pdf
,