[1] 罗小双,杨晓元,王绪安.适用于社交网络的隐私保护兴趣度匹配方案[J].计算机应用,2016,36(12):3322-3327. (LUO X S,YANG X Y,WANG X A. Privacy preserving interest matching scheme for social network[J]. Journal of Computer Applications, 2016, 36(12):3322-3327.) [2] PATSAKIS C, ZIGOMITROS A, SOLANAS A. Privacy-aware genome mining:server-assisted protocols for private set intersection and pattern matching[C]//Proceedings of the 2015 IEEE 28th International Symposium on Computer-Based Medical Systems. Washington, DC:IEEE Computer Society, 2015:276-279. [3] ABADI A, TERZIS S, DONG C. O-PSI:delegated private set intersection on outsourced datasets[C]//SEC 2015:Proceedings of the 2015 International Information Security Conference on ICT Systems Security and Privacy Protection, IFIPAICT 455. Cham:Springer, 2015:3-17. [4] DACHMAN-SOLED D, MALKIN T, RAYKOVA M, et al. Efficient robust private set intersection[C]//ACNS 2009:Proceedings of the 2006 International Conference on Applied Cryptography and Network Security, LNCS 5536. Berlin:Springer, 2006:125-142. [5] HAZAY C. Oblivious polynomial evaluation and secure set intersection from algebraic PRFs[C]//TCC 2015:Proceedings of the 2015 Theory of Cryptography Conference, LNCS 9015. Berlin:Springer, 2015:90-120. [6] FREEDMAN M J, NISSIM K, PINKAS B. Efficient private matching and set intersection[C]//EUROCRYPT 2004:Proceedings of the 2004 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3027. Berlin:Springer, 2004:1-19. [7] KISSNER L, SONG D. Privacy-preserving set operations[C]//CRYPTO'05:Proceedings of the 25th Annual International Conference on Advances in Cryptology, LNCS 3621. Berlin:Springer, 2005:241-257. [8] 李顺东,周素芳,郭奕旻,等.云环境下集合隐私计算[J].软件学报,2016,27(6):1549-1565. (LI S D, ZHOU S F, GUO Y M, et al. Secure set computing on cloud computing[J]. Journal of Software, 2016, 27(6):1549-1565.) [9] de CRISTOFARO E, TSUDIK G. Practical private set intersection protocols with linear complexity[C]//FC 2010:Proceedings of the 2010 International Conference on Financial Cryptography and Data Security, LNCS 6052. Berlin:Springer, 2010:143-159. [10] 张恩,蔡永泉.理性的安全两方计算协议[J].计算机研究与发展,2013,50(7):1409-1417. (ZHANG E, CAI Y Q. Rational secure two-party computation protocol[J]. Journal of Computer Research and Development, 2013, 50(7):1409-1417.) [11] ZHANG E, LI F, NIU B, et al. Server-aided private set intersection based on reputation[J]. Information Sciences, 2017, 387:180-194. [12] DONG C, CHEN L, WEN Z. When private set intersection meets big data:an efficient and scalable protocol[C]//CCS'13:Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM, 2013:789-800. [13] KAMARA S, MOHASSEL P, RAYKOVA M, et al. Scaling private set intersection to billion-element sets[C]//FC 2014:Proceedings of the 2014 International Conference on Financial Cryptography and Data Security, LNCS 8437. Berlin:Springer, 2014:195-215. [14] CHEN H, LAINE K, RINDAL P. Fast private set intersection from homomorphic encryption[C]//Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM, 2017:1243-1255. [15] RINDAL P, ROSULEK M. Improved private set intersection against malicious adversaries[C]//EUROCRYPT 2017:Proceedings of the 2017 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 10210. Cham:Springer, 2017:235-259. [16] DONG C, CHEN L, WEN Z. When private set intersection meets big data:an efficient and scalable protocol[C]//CCS'13:Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM, 2013:789-800. [17] KERSCHBAUM F. Outsourced private set intersection using homomorphic encryption[C]//ASIACCS'12:Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. New York:ACM, 2012:85-86. [18] BLOOM B H. Space/time trade-offs in hash coding with allowable errors[J]. Communications of the ACM, 1970, 13(7):422-426. [19] BOSE P, GUO H, KRANAKIS E, et al. On the false-positive rate of Bloom filters[J]. Information Processing Letters, 2008, 108(4):210-213. [20] PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[C]//EUROCRYPT 1999:Proceedings of the 1999 International Conference on Theory and Application of Cryptographic Techniques, LNCS 1592. Berlin:Springer, 1999:223-238. [21] BLAZE M, BLEUMER G, STRAUSS M. Divertible protocols and atomic proxy cryptography[C]//EUROCRYPT 1998:Proceedings of the 1998 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 1403. Berlin:Springer, 1998:127-144. [22] NUÑEZ D, AGUDO I, LOPEZ J. NTRU ReEncrypt:an efficient proxy re-encryption scheme based on NTRU[C]//ASIA CCS'15:Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. New York:ACM, 2015:179-189. [23] GOLDREICH O. Foundations of Cryptography:Volume 2, Basic Applications[M]. New York:Cambridge University Press, 2009:620-625. |