1. Privacy-preserving set operations;Kissner,2005
2. Efficient private matching and set intersection;Freedman,2004
3. Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries;Hazay,2008
4. Outsourced private set intersection using homomorphic encryption;Kerschbaum,2012
5. Private set intersection: are garbled circuits better than custom protocols?;Huang,2012