Efficient Set Operations in the Presence of Malicious Adversaries

Carmit Hazay, Kobbi Nissim. Efficient Set Operations in the Presence of Malicious Adversaries. IACR Cryptology ePrint Archive, 2009:594, 2009. [doi]

Authors

Carmit Hazay

This author has not been identified. Look up 'Carmit Hazay' in Google

Kobbi Nissim

This author has not been identified. Look up 'Kobbi Nissim' in Google