Efficient set operations in the presence of malicious adversaries
From MaRDI portal
Publication:434343
DOI10.1007/s00145-011-9098-xzbMath1272.94034WikidataQ59379655 ScholiaQ59379655MaRDI QIDQ434343
Publication date: 10 July 2012
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-011-9098-x
set intersection; constant-round protocols; malicious parties; oblivious pseudorandom function evaluation protocol; secure two-party protocols; set union
94A60: Cryptography
Related Items
Scalable Multi-party Private Set-Intersection, Automata evaluation and text search protocols with simulation-based security, Rate-limited secure function evaluation, Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs, Quantum secure two-party computation for set intersection with rational players, Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry, Zero-Knowledge Accumulators and Set Algebra, Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Probabilistic encryption
- How to construct constant-round zero-knowledge proof systems for NP
- Security and composition of multiparty cryptographic protocols
- Secure multiparty computation of approximations
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
- Number-theoretic constructions of efficient pseudo-random functions
- How asymmetry helps load balancing
- Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
- Secure Linear Algebra Using Linearly Recurrent Sequences
- Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries
- A Framework for Efficient and Composable Oblivious Transfer
- Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection
- Private Intersection of Certified Sets
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Balanced Allocations
- Foundations of Cryptography
- Foundations of Cryptography
- Communication preserving protocols for secure function evaluation
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- Privacy-Preserving Set Operations
- Theory of Cryptography
- Theory of Cryptography
- Theory of Cryptography
- Privacy preserving data mining