Pages that link to "Item:Q5445504"
From MaRDI portal
The following pages link to Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries (Q5445504):
Displaying 25 items.
- An efficient quantum scheme for private set intersection (Q265398) (← links)
- Efficient set intersection with simulation-based security (Q271588) (← links)
- Automata evaluation and text search protocols with simulation-based security (Q290379) (← links)
- Rate-limited secure function evaluation (Q329720) (← links)
- Efficient set operations in the presence of malicious adversaries (Q434343) (← links)
- A communication-efficient private matching scheme in client-server model (Q726566) (← links)
- Computationally secure pattern matching in the presence of malicious adversaries (Q744607) (← links)
- On the impossibility of structure-preserving deterministic primitives (Q1715860) (← links)
- Private set-intersection with common set-up (Q1783703) (← links)
- PRUB: A privacy protection friend recommendation system based on user behavior (Q1793689) (← links)
- Quantum secure two-party computation for set intersection with rational players (Q1993844) (← links)
- Secure and efficient multiparty private set intersection cardinality (Q2025374) (← links)
- Two-sided malicious security for private intersection-sum with cardinality (Q2102051) (← links)
- A novel quantum protocol for private set intersection (Q2239574) (← links)
- Server-aided private set intersection based on reputation (Q2293036) (← links)
- Private set intersection: new generic constructions and feasibility results (Q2408281) (← links)
- Secure parameterized pattern matching (Q2663480) (← links)
- Decentralized multi-client functional encryption for set intersection with improved efficiency (Q2692968) (← links)
- Bounded Size-Hiding Private Set Intersection (Q2827733) (← links)
- An Efficient Protocol for Oblivious DFA Evaluation and Applications (Q2890023) (← links)
- New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness (Q2988351) (← links)
- Secure Set Intersection with Untrusted Hardware Tokens (Q3073691) (← links)
- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries (Q3540034) (← links)
- Rate-Limited Secure Function Evaluation: Definitions and Constructions (Q4916025) (← links)
- Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries (Q5962221) (← links)