참고문헌
- R. Agrawal, A. Evfimievski, and R. Srikant, Information sharing across private databases, In SIGMOD 2003, Proceedings of the 2003 ACM SIGMOD international conference on Management of data, pp. 86–97, ACM Press, 2003.
- D. Boneh, E.-J. Goh, and K. Nissim, Evaluating 2-DNF formulas on ciphertexts, In TCC 2005, Lecture Notes in Comput. Sci. Vol. 3378, pp. 325–341. Springer-Verlag, 2005.
- P.-A. Fouque and D. Pointcheval, Threshold cryptosystems secure against chosenciphertext attacks, In Advances in Cryptology-Asiacrypt 2000, Lecture Notes in Comput. Sci. Vol. 1976, pp. 573–584, Springer-Verlag, 2000.
- M. Freedman, K. Nissim, and B. Pinkas, Efficient private matching and set intersection, Advances in cryptology-EUROCRYPT 2004, Lecture Notes in Comput. Sci. Vol. 3027, pp. 1–19, Springer, Berlin, 2004.
- O. Goldreich, The Foundations of Cryptography - Vol. 2, Cambridge University Press, 2004.
- L. Kissner, Privacy-preserving distributed information sharing, Ph. D. Thesis, 2006, http://www.cs.cmu.edu/ leak/papers/thesis.pdf
- L. Kissner and D. Song, Privacy-preserving set operations, Advances in cryptology- CRYPTO 2005, Lecture Notes in Comput. Sci. Vol. 3621, pp. 241–257, Springer, Berlin, 2005.
- L. Kissner and D. Song, Private and threshold set-intersection, Technical Report CMU-CS-05-113, Carnegie Mellon University, 2005.
- P. Pallier, Public-key cryptosystems based on composite degree residuosity classes, In Advances in Cryptology-Eurocrypt 1999, Lecture Notes in Comput. Sci. Vol. 1592, pp. 223–238, Springer-Verlag, 1999.
- J. Seo and H. Yoon, Analysis of privacy-preserving element reduction of a multiset, Memoir of the 2nd cryptology paper contest, arranged by a government organization, pp. 77–91, 2006. https://doi.org/10.4134/JKMS.2009.46.1.059
피인용 문헌
- Privacy-preserving disjunctive normal form operations on distributed sets vol.231, 2013, https://doi.org/10.1016/j.ins.2011.07.003