Efficient Set Operations in the Presence of Malicious Adversaries

Carmit Hazay, Kobbi Nissim. Efficient Set Operations in the Presence of Malicious Adversaries. J. Cryptology, 25(3):383-433, 2012. [doi]

Abstract

Abstract is missing.