Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries

Posted by