Efficient set operations in the presence of malicious adversaries (Q434343): Difference between revisions
From MaRDI portal
Created a new Item |
Changed an Item |
||
Property / author | |||
Property / author: Kobbi Nissim / rank | |||
Normal rank | |||
Property / Mathematics Subject Classification ID | |||
Property / Mathematics Subject Classification ID: 94A60 / rank | |||
Normal rank | |||
Property / zbMATH DE Number | |||
Property / zbMATH DE Number: 6054130 / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
secure two-party protocols | |||
Property / zbMATH Keywords: secure two-party protocols / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
set intersection | |||
Property / zbMATH Keywords: set intersection / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
set union | |||
Property / zbMATH Keywords: set union / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
malicious parties | |||
Property / zbMATH Keywords: malicious parties / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
constant-round protocols | |||
Property / zbMATH Keywords: constant-round protocols / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
oblivious pseudorandom function evaluation protocol | |||
Property / zbMATH Keywords: oblivious pseudorandom function evaluation protocol / rank | |||
Normal rank |
Revision as of 23:37, 29 June 2023
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Efficient set operations in the presence of malicious adversaries |
scientific article |
Statements
Efficient set operations in the presence of malicious adversaries (English)
0 references
10 July 2012
0 references
secure two-party protocols
0 references
set intersection
0 references
set union
0 references
malicious parties
0 references
constant-round protocols
0 references
oblivious pseudorandom function evaluation protocol
0 references