Efficient set operations in the presence of malicious adversaries (Q434343): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
Importer (talk | contribs)
Changed an Item
Property / author
 
Property / author: Kobbi Nissim / rank
 
Normal rank
Property / Mathematics Subject Classification ID
 
Property / Mathematics Subject Classification ID: 94A60 / rank
 
Normal rank
Property / zbMATH DE Number
 
Property / zbMATH DE Number: 6054130 / rank
 
Normal rank
Property / zbMATH Keywords
 
secure two-party protocols
Property / zbMATH Keywords: secure two-party protocols / rank
 
Normal rank
Property / zbMATH Keywords
 
set intersection
Property / zbMATH Keywords: set intersection / rank
 
Normal rank
Property / zbMATH Keywords
 
set union
Property / zbMATH Keywords: set union / rank
 
Normal rank
Property / zbMATH Keywords
 
malicious parties
Property / zbMATH Keywords: malicious parties / rank
 
Normal rank
Property / zbMATH Keywords
 
constant-round protocols
Property / zbMATH Keywords: constant-round protocols / rank
 
Normal rank
Property / zbMATH Keywords
 
oblivious pseudorandom function evaluation protocol
Property / zbMATH Keywords: oblivious pseudorandom function evaluation protocol / rank
 
Normal rank

Revision as of 00:37, 30 June 2023

scientific article
Language Label Description Also known as
English
Efficient set operations in the presence of malicious adversaries
scientific article

    Statements

    Efficient set operations in the presence of malicious adversaries (English)
    0 references
    0 references
    0 references
    0 references
    10 July 2012
    0 references
    0 references
    secure two-party protocols
    0 references
    set intersection
    0 references
    set union
    0 references
    malicious parties
    0 references
    constant-round protocols
    0 references
    oblivious pseudorandom function evaluation protocol
    0 references