相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage
Ningyu Chen et al.
IEEE TRANSACTIONS ON COMPUTERS (2022)
Secure Lightweight Key Exchange Using ECC for User-Gateway Paradigm
Chintan Patel et al.
IEEE TRANSACTIONS ON COMPUTERS (2021)
SECURE AND EFFICIENT MULTIPARTY PRIVATE SET INTERSECTION CARDINALITY
Sumit Kumar Debnath et al.
ADVANCES IN MATHEMATICS OF COMMUNICATIONS (2021)
Efficient Delegated Private Set Intersection on Outsourced Private Datasets
Aydin Abadi et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)
Identity-Based Private Matching over Outsourced Encrypted Datasets
Shuo Qiu et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2018)
Scalable Private Set Intersection Based on OT Extension
Benny Pinkas et al.
ACM TRANSACTIONS ON PRIVACY AND SECURITY (2018)
Labeled PSI from Fully Homomorphic Encryption with Malicious Security
Hao Chen et al.
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)
Blockchain challenges and opportunities: a survey
Zibin Zheng et al.
INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES (2018)
Efficient Batched Oblivious PRF with Applications to Private Set Intersection
Vladimir Kolesnikov et al.
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)
Toward Efficient and Privacy-Preserving Computing in Big Data Era
Rongxing Lu et al.
IEEE NETWORK (2014)
EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity
Carlo Blundo et al.
JOURNAL OF COMPUTER SECURITY (2014)