Efficient set intersection with simulation-based security (Q271588): Difference between revisions

From MaRDI portal
Created claim: Wikidata QID (P12): Q59379588, #quickstatements; #temporary_batch_1707252663060
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: gmp / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s00145-014-9190-0 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2129550671 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Balanced Allocations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cuckoo hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: (If) Size Matters: Size-Hiding Private Set Intersection / rank
 
Normal rank
Property / cites work
 
Property / cites work: Explicit and efficient hash families suffice for cuckoo hashing with a stash / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778845 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A proof of security of Yao's protocol for two-party computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035733 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient generation of shared RSA keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Applications of matrix methods to the theory of lower bounds in computational complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: A fair and efficient solution to the socialist millionaires' problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security and composition of multiparty cryptographic protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Secure Computation of Set Intersection / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure two-party computation via cut-and-choose oblivious transfer / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to construct constant-round zero-knowledge proof systems for NP / rank
 
Normal rank
Property / cites work
 
Property / cites work: Private Intersection of Certified Sets / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2724587 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiparty Computation from Somewhat Homomorphic Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient robust private set intersection / rank
 
Normal rank
Property / cites work
 
Property / cites work: Almost random graphs with simple hash functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing / rank
 
Normal rank
Property / cites work
 
Property / cites work: A public key cryptosystem and a signature scheme based on discrete logarithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4279565 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3777937 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Set Operations in the Presence of Malicious Adversaries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5750403 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Two-Party Secure Computation on Committed Inputs / rank
 
Normal rank
Property / cites work
 
Property / cites work: More Robust Hashing: Cuckoo Hashing with a Stash / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3149675 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Probabilistic Communication Complexity of Set Intersection / rank
 
Normal rank
Property / cites work
 
Property / cites work: Privacy-Preserving Set Operations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - ASIACRYPT 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Protocol for Conditional Disclosure of Secrets and Its Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: How asymmetry helps load balancing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Oblivious transfer and polynomial evaluation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2768332 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035712 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Uniform Hashing in Constant Time and Optimal Space / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Power of Simple Tabulation Hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4247202 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3549621 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Asymmetric balanced allocation with simple hash functions / rank
 
Normal rank

Latest revision as of 18:48, 11 July 2024

scientific article
Language Label Description Also known as
English
Efficient set intersection with simulation-based security
scientific article

    Statements

    Efficient set intersection with simulation-based security (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    7 April 2016
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers