Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- 2008
- C. Hazay and Y. Lindell.
- In the Journal of Cryptology, 23(3):422-456, 2010. An extended abstract appeared in TCC 2008, Springer (LNCS 4948) pages 155-175, 2008.