Efficient Set Operations in the Presence of Malicious Adversaries

Carmit Hazay, Kobbi Nissim. Efficient Set Operations in the Presence of Malicious Adversaries. IACR Cryptology ePrint Archive, 2009:594, 2009. [doi]

Abstract

Abstract is missing.