Two-sided malicious security for private intersection-sum with cardinality (Q2102051): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(4 intermediate revisions by 3 users not shown)
Property / author
 
Property / author: Mordechai M. Yung / rank
Normal rank
 
Property / author
 
Property / author: Mordechai M. Yung / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-56877-1_1 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3022916067 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Zero-Knowledge Argument for Correctness of a Shuffle / rank
 
Normal rank
Property / cites work
 
Property / cites work: Randomizable Proofs and Delegatable Anonymous Credentials / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374927 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364567 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Private Intersection of Certified Sets / rank
 
Normal rank
Property / cites work
 
Property / cites work: Combining private set intersection with secure two-party computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2724587 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure and efficient private set intersection cardinality using Bloom filter / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Cryptography - PKC 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters / rank
 
Normal rank
Property / cites work
 
Property / cites work: A public key cryptosystem and a signature scheme based on discrete logarithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: How To Prove Yourself: Practical Solutions to Identification and Signature Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient set intersection with simulation-based security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364540 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Linear Algebra with Sub-linear Zero-Knowledge Arguments / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Set Operations in the Presence of Malicious Adversaries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection / rank
 
Normal rank
Property / cites work
 
Property / cites work: Privacy-Preserving Set Operations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two-sided malicious security for private intersection-sum with cardinality / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cuckoo hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035712 / rank
 
Normal rank
Property / cites work
 
Property / cites work: SpOT-light: lightweight private set intersection from sparse OT extension / rank
 
Normal rank
Property / cites work
 
Property / cites work: PSI from PaXoS: fast, malicious private set intersection / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient circuit-based PSI with linear communication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient circuit-based PSI via cuckoo hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Private Set Intersection Against Malicious Adversaries / rank
 
Normal rank

Latest revision as of 01:14, 31 July 2024

scientific article
Language Label Description Also known as
English
Two-sided malicious security for private intersection-sum with cardinality
scientific article

    Statements

    Two-sided malicious security for private intersection-sum with cardinality (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    7 December 2022
    0 references
    malicious security
    0 references
    shuffled distributed oblivious PRF
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers