Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries

Carmit Hazay, Yehuda Lindell. Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In Ran Canetti, editor, Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Volume 4948 of Lecture Notes in Computer Science, pages 155-175, Springer, 2008. [doi]

Abstract

Abstract is missing.