Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries Posted June 18, 2016 by Alon