| 1 |
张恩, 秦磊勇, 杨刃林, 等. 基于弹性秘密共享的多方门限隐私集合交集协议. 软件学报, 2023, 34 (11): 5424- 5441.
doi: 10.13328/j.cnki.jos.006743
|
|
ZHANG E , QIN L Y , YANG R L , et al. Multi-party threshold private set intersection protocol based on robust secret sharing. Journal of Software, 2023, 34 (11): 5424- 5441.
doi: 10.13328/j.cnki.jos.006743
|
| 2 |
魏立斐, 刘纪海, 张蕾, 等. 双云辅助的超阈值多方隐私集合交集计算协议. 软件学报, 2023, 34 (11): 5442- 5456.
|
|
WEI L F , LIU J H , ZHANG L , et al. Two cloud-assisted over-threshold multi-party private set intersection calculation protocol. Journal of Software, 2023, 34 (11): 5442- 5456.
|
| 3 |
张蕾, 贺崇德, 魏立斐. 高效且恶意安全的三方小集合隐私交集计算协议. 计算机研究与发展, 2022, 59 (10): 2286- 2298.
doi: 10.7544/issn1000-1239.20220471
|
|
ZHANG L , HE C D , WEI L F . Efficient and malicious secure three-party private set intersection computation protocols for small sets. Journal of Computer Research and Development, 2022, 59 (10): 2286- 2298.
doi: 10.7544/issn1000-1239.20220471
|
| 4 |
UZUN E, CHUNG S P, KOLESNIKOV V, et al. Fuzzy labeled private set intersection with applications to private real-time biometric search[C]//Proceedings of the 30th USENIX Security Symposium. [S. l. ]: USENIX, 2021: 911-928.
|
| 5 |
MEADOWS C. A more efficient cryptographic matchmaking protocol for use in the absence of a continuously available third party[C]//Proceedings of the IEEE Symposium on Security and Privacy. Oakland, USA: IEEE Press, 1986: 134-134.
|
| 6 |
RINDAL P, SCHOPPMANN P. VOLE-PSI: fast OPRF and circuit-PSI from vector-OLE[C]//Proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin, Germany: Springer, 2021: 901-930.
|
| 7 |
RAGHURAMAN S, RINDAL P. Blazing fast PSI from improved OKVS and subfield VOLE[C]//Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. New York, USA: ACM Press, 2022: 2505-2517.
|
| 8 |
LIU F H, ZHANG E, QIN L Y. Efficient multiparty probabilistic threshold private set intersection[C]//Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. New York, USA: ACM Press, 2023: 2188-2201.
|
| 9 |
FREEDMAN M J, NISSIM K, PINKAS B. Efficient private matching and set intersection[C]//Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. Berlin, Germany: Springer. 2004. 1-19.
|
| 10 |
CHMIELEWSKI L, HOEPMAN J H. Fuzzy private matching[C]//Proceedings of the 3rd International Conference on Availability. Barcelona, Spain: IEEE Press, 2008, 327-334.
|
| 11 |
YE Q S, STEINFELD R, PIEPRZYK J, et al. Efficient fuzzy matching and intersection on private datasets[C]//Proceedings of Conference on Information Security and Cryptology. Berlin, Germany: Springer, 2009: 211-228.
|
| 12 |
李婷. 基于大数据平台支持任意计算和模糊匹配的隐私保护集合交集方案[D]. 西安: 西安电子科技大学, 2024.
|
|
LI T. Private set intersection scheme based on big data platform supporting full computation and fuzzy matching[D]. Xi'an: Xidian University, 2024. (in Chinese)
|
| 13 |
INDYK P, WOODRUFF D. Polylogarithmic private approximations and efficient matching[C]//Proceedings of the 3rd Theory of Cryptography Conference. Berlin, Germany: Springer, 2006: 245-264.
|
| 14 |
CHAKRABORTI A, FANTI G, REITER M K. Distance-aware private set intersection[C]//Proceedings of the 32nd USENIX Security Symposium. Anaheim, USA: USENIX, 2023: 319-336.
|
| 15 |
GARIMELLA G, ROSULEK M, SINGH J. Structure-aware private set intersection. with applications to fuzzy matching[C]//Proceedings of the 42nd Annual International Cryptology Conference. Berlin, Germany: Springer, 2022: 323-352.
|
| 16 |
GARIMELLA G, ROSULEK M, SINGH J. Malicious secure, structure-aware private set intersection[C]//Proceedings of the 43rd Annual International Cryptology Conference. Berlin, Germany: Springer, 2023: 577-610.
|
| 17 |
BAARSEN A, PU S H. Fuzzy private set intersection withLarge hyperballs[C]//Proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin, Germany: Springer, 2024: 340-369.
|
| 18 |
CRISTOFARO E, GASTI P, TSUDIK G. Fast and private computation of cardinality of set intersection and union[C]//Proceedings of International Conference on Cryptology and Network Security. Berlin, Germany: Springer, 2012: 218-231.
|
| 19 |
DEBNATH S K, DUTTA R. Secure and efficient private set intersection cardinality using bloom filter[C]//Proceedings of the 18th International Conference on Information Security. Berlin, Germany: Springer, 2015: 209-226.
|
| 20 |
YANG Y B , DONG X L , CAO Z F , et al. EMPSI: efficient multiparty private set intersection (with cardinality). Frontiers of Computer Science, 2023, 18 (1): 181804.
doi: 10.1007/s11704-022-2269-0
|
| 21 |
YANG X Y , ZHAO Y Q , ZHOU S F , et al. A lightweight delegated private set intersection cardinality protocol. Computer Standards & Interfaces, 2024, 87, 103760.
URL
|
| 22 |
CHEN Y F , WU A X , YANG Y E , et al. Efficient verifiable cloud-assisted PSI cardinality for privacy-preserving contact tracing. IEEE Transactions on Cloud Computing, 2024, 12 (1): 251- 263.
doi: 10.1109/TCC.2024.3360098
|
| 23 |
DUONG T, PHAN D H, TRIEU N. Catalic: delegated PSI cardinality with applications to contact tracing[C]//Proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security. Berlin, Germany: Springer, 2020: 870-899.
|
| 24 |
WU M, YUEN T H. Efficient unbalanced private set intersection cardinality and user-friendly privacy-preserving contact tracing[C]//Proceedings of the 32nd USENIX Security Symposium. Anaheim, USA: USENIX, 2023: 283-300.
|
| 25 |
PINKAS B, SCHNEIDER T, TKACHENKO O, et al. Efficient circuit-based PSI with linear communication[C]//Advances in Cryptology-EUROCRYPT 2019. Berlin, Germany: Springer, 2019: 122-153.
|
| 26 |
PINKAS B, SCHNEIDER T, WEINERT C, et al. Efficient circuit-based PSI via cuckoo hashing[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin, Germany: Springer, 2018: 125-157.
|
| 27 |
CHEN H, HUANG Z, LAINE K, et al. Labeled PSI from fully homomorphic encryption with malicious security[C]//Proceedings of 2018 ACM SIGSAC Conference on Computer and Communications Security. New York, USA: ACM, 2018: 1223-1237.
|
| 28 |
CHEN H, LAINE K, RINDAL P. Fast private set intersection from homomorphic encryption[C]//Proceedings of 2017 ACM SIGSAC Conference on Computer and Communications Security. Dallas, USA: ACM Press, 2017: 1243-1255.
|
| 29 |
CONG K, MORENO R C, GAMA M B, et al. Labeled PSI from homomorphic encryption with reduced computation and communication[C]//Proceedings of 2021 ACM SIGSAC Conference on Computer and Communications Security. New York, USA: ACM Press, 2021: 1135-1150.
|
| 30 |
ZHANG C, CHEN Y, LIU W, et al. Linear private set union from multi-query reverse private membership test[C]//Proceedings of the 32nd USENIX Security Symposium. Anaheim, USA: USENIX, 2023: 337-354.
|