1 |
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Advances in Cryptology-EUROCRYPTO '99, ser. Lecture Notes in Comput. Sci., vol. 1592. Springer-Verlag, 1999, pp. 223-238
|
2 |
Goldreich, Foundations of Cryptography. Cambridge University Press, 2004, vol. 2
|
3 |
P. Fouque, G. Poupard, and J. Stern, "Sharing decryption in the context of voting of lotteries," in Proc. International Conference on Financial Cryptography (FC '00), ser. Lecture Notes in Comput. Sci., vol. 1962. Springer-Verlag, 2000, pp. 90-104
|
4 |
L. Kissner and D. Song, "Privacy-preserving set operations," in Advances in Cryptology-CRYPTO 2005, ser. Lecture Notes in Comput. Sci., vol. 3621. Springer-Verlag, 22005, pp. 241-257
|
5 |
M. J. Freedman, K. Nissim, and B. Pinkas. "Efficient private matching and set intersection," in Advances in Cryptology-EUROCRYPT 2004, ser. Lecture Notes in comput. Sci., vol. 3027. Springer- Verlag, 2004, pp. 1-19
|
6 |
F. Bao, R. H. Deng, and W. Mao, "Efficient and practical fair exchange protocols with off-line TTP," in Proc. IEEE Symposium on Security and Privacy, Oakland, CA, May 1998, pp. 77-85
|
7 |
Y. Li, J. D. Tygar, and J. M. Hellerstein, "Private matching," Intel Research, Tech. Rep. IRB-TR- 04-005, Feb. 2004
|
8 |
M. K. Franklin and M. K. Reiter, "Fair exchange with a semi-trusted third party," in Proc. ACM Conference on Computer and Communications Security (CCS '97), Zurish, Switzerland, Apr. 1997, pp. 1-5
|
9 |
R. Agrawal, A. Evfimievski, and R. Srikant, "Information sharing across private databases," in Proc. ACM SIGMOD 2003, San Diego, CA, Jun. 2003, pp. 86-97
|