메뉴 건너뛰기




Volumn 8437, Issue , 2014, Pages 195-215

Scaling private set intersection to billion-element sets

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DATA MINING; DATA PRIVACY; LOCATION BASED SERVICES; TELECOMMUNICATION SERVICES;

EID: 85000797782     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-45472-5_13     Document Type: Conference Paper
Times cited : (108)

References (64)
  • 1
    • 84945134014 scopus 로고    scopus 로고
    • Priced oblivious transfer: How to sell digital goods
    • Pfitzmann, B. (ed.), Springer, Heidelberg
    • Aiello, W., Ishai, Y., Reingold, O.: Priced oblivious transfer: How to sell digital goods. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 119–135. Springer, Heidelberg (2001)
    • (2001) EUROCRYPT 2001. LNCS , vol.2045 , pp. 119-135
    • Aiello, W.1    Ishai, Y.2    Reingold, O.3
  • 2
    • 84859950107 scopus 로고    scopus 로고
    • Multiparty computation with low communication, computation and interaction via threshold FHE
    • Pointcheval, D., Johansson, T. (eds.), Springer, Heidelberg
    • Asharov, G., Jain, A., López-Alt, A., Tromer, E., Vaikuntanathan, V., Wichs, D.: Multiparty computation with low communication, computation and interaction via threshold FHE. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 483–501. Springer, Heidelberg (2012)
    • (2012) EUROCRYPT 2012. LNCS , vol.7237 , pp. 483-501
    • Asharov, G.1    Jain, A.2    López-Alt, A.3    Tromer, E.4    Vaikuntanathan, V.5    Wichs, D.6
  • 3
    • 80755143980 scopus 로고    scopus 로고
    • Countering gattaca: Efficient and secure testing of fully-sequenced human genomes
    • Baldi, P., Baronio, R., De Cristofaro, E., Gasti, P., Tsudik, G.: Countering gattaca: efficient and secure testing of fully-sequenced human genomes. In: CCS, pp. 691–702 (2011)
    • (2011) CCS , vol.691-702
    • Baldi, P.1    Baronio, R.2    De Cristofaro, E.3    Gasti, P.4    Tsudik, G.5
  • 4
    • 0036294828 scopus 로고    scopus 로고
    • Universal arguments and their applications
    • Barak, B., Goldreich, O.: Universal arguments and their applications. In: CCC (2002)
    • (2002) CCC
    • Barak, B.1    Goldreich, O.2
  • 5
    • 70349266254 scopus 로고    scopus 로고
    • Fairplaymp: A system for secure multi-party computation
    • Ben-David, A., Nisan, N., Pinkas, B.: Fairplaymp: a system for secure multi-party computation. In: CCS (2008)
    • (2008) CCS
    • Ben-David, A.1    Nisan, N.2    Pinkas, B.3
  • 6
    • 57049188348 scopus 로고    scopus 로고
    • Sharemind: A framework for fast privacypreserving computations
    • Jajodia, S., Lopez, J. (eds.), Springer, Heidelberg
    • Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A framework for fast privacypreserving computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192–206. Springer, Heidelberg (2008)
    • (2008) ESORICS 2008. LNCS , vol.5283 , pp. 192-206
    • Bogdanov, D.1    Laur, S.2    Willemson, J.3
  • 7
    • 77955146714 scopus 로고    scopus 로고
    • Kr?gaard, M., Nielsen, J., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Secure multiparty computation goes live
    • Bogetoft, P., Christensen, D., Damgard, I., Geisler, M., Jakobsen, T., Kr?gaard, M., Nielsen, J., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Secure multiparty computation goes live. In: FC (2009)
    • (2009) FC
    • Bogetoft, P.1    Christensen, D.2    Damgard, I.3    Geisler, M.4    Jakobsen, T.5
  • 8
    • 0035879575 scopus 로고    scopus 로고
    • A fair and efficient solution to the socialist millionaires’ problem. Discrete Appl
    • Boudot, F., Schoenmakers, B., Traore, J.: A fair and efficient solution to the socialist millionaires’ problem. Discrete Appl. Math. 111(1), 23–36 (2001)
    • (2001) Math , vol.111 , Issue.1 , pp. 23-36
    • Boudot, F.1    Schoenmakers, B.2    Traore, J.3
  • 9
    • 70350400269 scopus 로고    scopus 로고
    • Private intersection of certified sets
    • Camenisch, J., Zaverucha, G.: Private intersection of certified sets. In: FC, pp. 108–127 (2009)
    • (2009) FC , pp. 108-127
    • Camenisch, J.1    Zaverucha, G.2
  • 10
    • 84884472579 scopus 로고    scopus 로고
    • Highlyscalable searchable symmetric encryption with support for boolean queries
    • Canetti, R., Garay, J.A. (eds.), Springer, Heidelberg
    • Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Rou, M.-C., Steiner, M.: Highlyscalable searchable symmetric encryption with support for boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 353– 373. Springer, Heidelberg (2013)
    • (2013) CRYPTO 2013, Part I. LNCS , vol.8042 , pp. 353-373
    • Cash, D.1    Jarecki, S.2    Jutla, C.3    Krawczyk, H.4    Ro񓝙u, M.-C.5    Steiner, M.6
  • 11
    • 26444507272 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Ioannidis, J., Keromytis, A.D., Yung, M. (eds.), Springer, #x00A0;Heidelberg
    • Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer,  Heidelberg (2005)
    • (2005) ACNS 2005. LNCS , vol.3531 , pp. 442-455
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 12
    • 78650834524 scopus 로고    scopus 로고
    • Structured encryption and controlled disclosure
    • Abe, M. (ed.), Springer, Heidelberg
    • Chase, M., Kamara, S.: Structured encryption and controlled disclosure. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 577–594. Springer, Heidelberg (2010)
    • (2010) ASIACRYPT 2010. LNCS , vol.6477 , pp. 577-594
    • Chase, M.1    Kamara, S.2
  • 13
    • 0012610677 scopus 로고
    • Limits on the security of coin flips when half the processors are faulty
    • Cleve, R.: Limits on the security of coin flips when half the processors are faulty. In: STOC, pp. 364–369 (1986)
    • (1986) STOC , vol.364-369
    • Cleve, R.1
  • 14
    • 77955318017 scopus 로고    scopus 로고
    • Practical private set intersection protocols with linear complexity
    • De Cristofaro, E., Tsudik, G.: Practical private set intersection protocols with linear complexity. In: Financial Cryptography, pp. 143–159 (2010)
    • (2010) Financial Cryptography , vol.143-159
    • De Cristofaro, E.1    Tsudik, G.2
  • 15
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: Improved definitions and efficient constructions. In: ACM CCS, pp. 79–88 (2006)
    • (2006) ACM CCS , vol.79-88
    • Curtmola, R.1    Garay, J.2    Kamara, S.3    Ostrovsky, R.4
  • 16
    • 68949136946 scopus 로고    scopus 로고
    • Efficient robust private set intersection
    • Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.), Springer, Heidelberg
    • Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Efficient robust private set intersection. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 125–142. Springer, Heidelberg (2009)
    • (2009) ACNS 2009. LNCS , vol.5536 , pp. 125-142
    • Dachman-Soled, D.1    Malkin, T.2    Raykova, M.3    Yung, M.4
  • 17
    • 79959306358 scopus 로고    scopus 로고
    • Secure efficient multiparty computing of multivariate polynomials and applications
    • Lopez, J., Tsudik, G. (eds.), Springer, Heidelberg
    • Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Secure efficient multiparty computing of multivariate polynomials and applications. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 130–146. Springer, Heidelberg (2011)
    • (2011) ACNS 2011. LNCS , vol.6715 , pp. 130-146
    • Dachman-Soled, D.1    Malkin, T.2    Raykova, M.3    Yung, M.4
  • 18
    • 85000877110 scopus 로고    scopus 로고
    • Wei Dai. Crypto++ library
    • Wei Dai. Crypto++ library. http://www.cryptopp.com/ (2013)
    • (2013)
  • 19
    • 80051631839 scopus 로고    scopus 로고
    • Kr?gaard, M., Nielsen, J.-B.: Asynchronous multiparty computation: Theory and implementation
    • Damgard, I., Geisler, M., Kr?gaard, M., Nielsen, J.-B.: Asynchronous multiparty computation: Theory and implementation. In: PKC (2009)
    • (2009) PKC
    • Damgard, I.1    Geisler, M.2
  • 20
    • 33745124039 scopus 로고    scopus 로고
    • Constant-Round multiparty computation using a blackbox pseudorandom generator
    • Shoup, V. (ed.), Springer, Heidelberg
    • Damgård, I.B., Ishai, Y.: Constant-Round multiparty computation using a blackbox pseudorandom generator. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 378–394. Springer, Heidelberg (2005)
    • (2005) CRYPTO 2005. LNCS , vol.3621 , pp. 378-394
    • Damgård, I.B.1    Ishai, Y.2
  • 21
    • 51849125042 scopus 로고    scopus 로고
    • Kr?gaard, M., Nielsen, J.B., Smith, A.: Scalable multiparty computation with nearly optimal work and resilience
    • ., Wagner, D. (ed.), Springer, Heidelberg
    • Damgård, I., Ishai, Y., Kr?gaard, M., Nielsen, J.B., Smith, A.: Scalable multiparty computation with nearly optimal work and resilience. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 241–261. Springer, Heidelberg (2008)
    • (2008) CRYPTO 2008. LNCS , vol.5157 , pp. 241-261
    • Damgård, I.1    Ishai, Y.2
  • 22
    • 78650834525 scopus 로고    scopus 로고
    • Linear-complexity private set intersection protocols secure in malicious model
    • Abe, M. (ed.), Springer, Heidelberg
    • De Cristofaro, E., Kim, J., Tsudik, G.: Linear-complexity private set intersection protocols secure in malicious model. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 213–231. Springer, Heidelberg (2010)
    • (2010) ASIACRYPT 2010. LNCS , vol.6477 , pp. 213-231
    • De Cristofaro, E.1    Kim, J.2    Tsudik, G.3
  • 23
    • 84863221426 scopus 로고    scopus 로고
    • Experimenting with fast private set intersection
    • Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.), Springer, Heidelberg
    • De Cristofaro, E., Tsudik, G.: Experimenting with fast private set intersection. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 55–73. Springer, Heidelberg (2012)
    • (2012) Trust 2012. LNCS , vol.7344 , pp. 55-73
    • De Cristofaro, E.1    Tsudik, G.2
  • 25
    • 84888990465 scopus 로고    scopus 로고
    • When private set intersection meets big data: An efficient and scalable protocol
    • Dong, C., Chen, L., Wen, Z.: When private set intersection meets big data: An efficient and scalable protocol. In: ACM CCS, pp. 789–800 (2013)
    • (2013) ACM CCS , pp. 789-800
    • Dong, C.1    Chen, L.2    Wen, Z.3
  • 27
    • 85000702243 scopus 로고    scopus 로고
    • Sparsehash library, Accessed 08 May
    • Donovan, H., et al.: Sparsehash library. https://code.google.com/p/sparsehash/ (2013). Accessed 08 May 2013
    • (2013)
    • Donovan, H.1
  • 28
    • 0030150177 scopus 로고    scopus 로고
    • Comparing information without leaking it. Commun
    • Fagin, R., Naor, M., Winkler, P.: Comparing information without leaking it. Commun. ACM 39(5), 77–85 (1996)
    • (1996) ACM , vol.39 , Issue.5 , pp. 77-85
    • Fagin, R.1    Naor, M.2    Winkler, P.3
  • 29
    • 79956328170 scopus 로고
    • A minimal model for secure computation (extended abstract)
    • Feige, U., Killian, J., Naor, M.: A minimal model for secure computation (extended abstract). In: STOC (1994)
    • (1994) STOC
    • Feige, U.1    Killian, J.2    Naor, M.3
  • 30
    • 79951794503 scopus 로고    scopus 로고
    • Secure set intersection with untrusted hardware tokens
    • Kiayias, A. (ed.), Springer, Heidelberg
    • Fischlin, M., Pinkas, B., Sadeghi, A.-R., Schneider, T., Visconti, I.: Secure set intersection with untrusted hardware tokens. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 1–16. Springer, Heidelberg (2011)
    • (2011) CT-RSA 2011. LNCS , vol.6558 , pp. 1-16
    • Fischlin, M.1    Pinkas, B.2    Sadeghi, A.-R.3    Schneider, T.4    Visconti, I.5
  • 31
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Cachin, C., Camenisch, J.L. (eds.), Springer, Heidelberg
    • Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1–19. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004. LNCS , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 32
    • 33745536762 scopus 로고    scopus 로고
    • Resource fairness and composability of cryptographic protocols
    • Halevi, S., Rabin, T. (eds.), Springer, Heidelberg
    • Garay, J.A., MacKenzie, P.D., Prabhakaran, M., Yang, K.: Resource fairness and composability of cryptographic protocols. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 404–428. Springer, Heidelberg (2006)
    • (2006) TCC 2006. LNCS , vol.3876 , pp. 404-428
    • Garay, J.A.1    Mackenzie, P.D.2    Prabhakaran, M.3    Yang, K.4
  • 33
    • 84884200669 scopus 로고    scopus 로고
    • Multiparty proximity testing with dishonest majority from equality testing
    • Czumaj, A., Mehlhorn, K., Pitts, A., Wattenhofer, R. (eds.), Springer, Heidelberg
    • Gelles, R., Ostrovsky, R., Winoto, K.: Multiparty proximity testing with dishonest majority from equality testing. In: Czumaj, A., Mehlhorn, K., Pitts, A., Wattenhofer, R. (eds.) ICALP 2012, Part II. LNCS, vol. 7392, pp. 537–548. Springer, Heidelberg (2012)
    • (2012) ICALP 2012, Part II. LNCS , vol.7392 , pp. 537-548
    • Gelles, R.1    Ostrovsky, R.2    Winoto, K.3
  • 34
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC (2009)
    • (2009) STOC
    • Gentry, C.1
  • 36
    • 77954649870 scopus 로고    scopus 로고
    • Partial fairness in secure two-party computation
    • Gilbert, H. (ed.), Springer, Heidelberg
    • Gordon, S.D., Katz, J.: Partial fairness in secure two-party computation. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 157–176. Springer, Heidelberg (2010)
    • (2010) EUROCRYPT 2010. LNCS , vol.6110 , pp. 157-176
    • Gordon, S.D.1    Katz, J.2
  • 37
    • 84855248474 scopus 로고    scopus 로고
    • Complete fairness in secure twoparty computation
    • Gordon, S.D., Hazay, C., Katz, J., Lindell, Y.: Complete fairness in secure twoparty computation. J. ACM 58(6), 24 (2011)
    • (2011) J. ACM , vol.58 , Issue.6
    • Gordon, S.D.1    Hazay, C.2    Katz, J.3    Lindell, Y.4
  • 38
    • 70349276910 scopus 로고    scopus 로고
    • Constructions of truly practical secure protocols using standardsmartcards
    • Hazay, C., Lindell, Y.: Constructions of truly practical secure protocols using standardsmartcards. In: CCS, pp. 491–500 (2008)
    • (2008) CCS , pp. 491-500
    • Hazay, C.1    Lindell, Y.2
  • 39
    • 40249108370 scopus 로고    scopus 로고
    • Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
    • Canetti, R. (ed.), Springer, Heidelberg
    • Hazay, C., Lindell, Y.: Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155–175. Springer, Heidelberg (2008)
    • (2008) TCC 2008. LNCS , vol.4948 , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 40
    • 77958060842 scopus 로고    scopus 로고
    • Efficient set operations in the presence of malicious adversaries. Public Key Cryptogr
    • Hazay, C., Nissim, K.: Efficient set operations in the presence of malicious adversaries. Public Key Cryptogr. PKC 2010, 312–331 (2010)
    • (2010) PKC , vol.2010 , pp. 312-331
    • Hazay, C.1    Nissim, K.2
  • 42
    • 84914127581 scopus 로고    scopus 로고
    • Faster secure two-party computation using garbled circuits
    • Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. In: USENIX Security (2011)
    • (2011) USENIX Security
    • Huang, Y.1    Evans, D.2    Katz, J.3    Malka, L.4
  • 43
    • 85168150014 scopus 로고    scopus 로고
    • Private set intersection: Are garbled circuits better than custom protocols?
    • Huang, Y., Evans, D., Katz, J.: Private set intersection: Are garbled circuits better than custom protocols? In: NDSS (2012)
    • (2012) NDSS
    • Huang, Y.1    Evans, D.2    Katz, J.3
  • 44
    • 77958056561 scopus 로고    scopus 로고
    • Fast secure computation of set intersection
    • In: Garay, J.A., De Prisco, R. (eds.), Springer, Heidelberg
    • Jarecki, S., Liu, X.: Fast secure computation of set intersection. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 418–435. Springer, Heidelberg (2010)
    • (2010) SCN 2010. LNCS , vol.6280 , pp. 418-435
    • Jarecki, S.1    Liu, X.2
  • 48
    • 84869441394 scopus 로고    scopus 로고
    • Salus: A system for server-aided secure function evaluation
    • Kamara, S., Mohassel, P., Riva, B.: Salus: A system for server-aided secure function evaluation. In: CCS, pp. 797–808 (2012)
    • (2012) CCS , pp. 797-808
    • Kamara, S.1    Mohassel, P.2    Riva, B.3
  • 49
    • 33745130227 scopus 로고    scopus 로고
    • Round efficiency of multi-party computation with a dishonest majority
    • Katz, J., Ostrovsky, R., Smith, A.: Round efficiency of multi-party computation with a dishonest majority. In: EUROCRYPT (2003)
    • (2003) EUROCRYPT
    • Katz, J.1    Ostrovsky, R.2    Smith, A.3
  • 50
    • 84871965745 scopus 로고    scopus 로고
    • Outsourcing private set intersection using homomorphic encryption
    • Kerschbaum, F.: Outsourcing private set intersection using homomorphic encryption. In: Asia CCS ’12 (2012)
    • (2012) Asia CCS ’12
    • Kerschbaum, F.1
  • 51
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • In: Shoup, V. (ed.), Springer, Heidelberg
    • Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241–257. Springer, Heidelberg (2005)
    • (2005) CRYPTO 2005. LNCS , vol.3621 , pp. 241-257
    • Kissner, L.1    Song, D.2
  • 53
    • 35048833033 scopus 로고    scopus 로고
    • Parallel coin-tossing and constant-round secure two-party computation
    • Kilian, J. (ed.), Springer, Heidelberg
    • Lindell, Y.: Parallel coin-tossing and constant-round secure two-party computation. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, p. 171. Springer, Heidelberg (2001)
    • (2001) CRYPTO 2001. LNCS , vol.2139
    • Lindell, Y.1
  • 54
    • 0345058962 scopus 로고    scopus 로고
    • Verifiable homomorphic oblivious transfer and private equality test
    • Laih, C.-S. (ed.), Springer, Heidelberg
    • Lipmaa, H.: Verifiable homomorphic oblivious transfer and private equality test. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 416–433. Springer, Heidelberg (2003)
    • (2003) ASIACRYPT 2003. LNCS , vol.2894 , pp. 416-433
    • Lipmaa, H.1
  • 55
    • 80755168310 scopus 로고    scopus 로고
    • Vmcrypt: Modular software architecture for scalable secure computation
    • Malka, L.: Vmcrypt: modular software architecture for scalable secure computation. In: CCS (2011)
    • (2011) CCS
    • Malka, L.1
  • 59
    • 38049154921 scopus 로고    scopus 로고
    • Fair secure two-party computation
    • Pinkas, B.: Fair secure two-party computation. In: Eurocrypt, pp. 647–647 (2003)
    • (2003) Eurocrypt
    • Pinkas, B.1
  • 60
    • 85000787550 scopus 로고    scopus 로고
    • Redis windows port, Accessed 08 May 2013
    • Rawas, H.: Redis windows port. https://github.com/MSOpenTech/redis (2013). Accessed 08 May 2013
    • (2013)
    • Rawas, H.1
  • 61
    • 84879548566 scopus 로고    scopus 로고
    • Private proximity testing with an untrusted server
    • Saldamli, G., Chow, R., Jin, H., Knijnenburg, B.: Private proximity testing with an untrusted server. In: SIGSAC, pp. 113–118 (2013)
    • (2013) SIGSAC , pp. 113-118
    • Saldamli, G.1    Chow, R.2    Jin, H.3    Knijnenburg, B.4
  • 62
    • 0033705124 scopus 로고    scopus 로고
    • Practical techniques for searching on encrypted data
    • Song, D., Wagner, D., Perrig, A.: Practical techniques for searching on encrypted data. In: IEEE S&P, pp. 44–55 (2000)
    • (2000) IEEE S&P , pp. 44-55
    • Song, D.1    Wagner, D.2    Perrig, A.3
  • 63
    • 85000653762 scopus 로고    scopus 로고
    • hiredis win32, Accessed 08 May 2013
    • Yaguang, T.: hiredis win32. https://github.com/texnician/hiredis-win32 (2013). Accessed 08 May 2013
    • (2013)
    • Yaguang, T.1
  • 64
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • Yao, A.: Protocols for secure computations. In: FOCS (1982)
    • (1982) FOCS
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.