Cryptology ePrint Archive: Report 2010/469
Available versions in chronological order
20100908:180823 (posted 08-Sep-2010 18:08:23 UTC)
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Emiliano De Cristofaro and Jihye Kim and Gene Tsudik
Publication Info: To appear in Asiacrypt 2010
20100915:090739 (posted 15-Sep-2010 09:07:39 UTC)
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Emiliano De Cristofaro and Jihye Kim and Gene Tsudik
Publication Info: To appear in Asiacrypt 2010
20100915:091000 (posted 15-Sep-2010 09:10:00 UTC)
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Emiliano De Cristofaro and Jihye Kim and Gene Tsudik
Publication Info: To appear in Asiacrypt 2010
20100915:091222 (posted 15-Sep-2010 09:12:22 UTC)
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Emiliano De Cristofaro and Jihye Kim and Gene Tsudik
Publication Info: To appear in Asiacrypt 2010
[
Cryptology ePrint archive
]