Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection

From MaRDI portal
Revision as of 04:16, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3611789

DOI10.1007/978-3-642-00457-5_34zbMath1213.94113OpenAlexW1756608328MaRDI QIDQ3611789

Stanislaw Jarecki, Xiaomin Liu

Publication date: 3 March 2009

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-00457-5_34




Related Items (40)

Efficient set intersection with simulation-based securityEfficient RSA Key Generation and Threshold Paillier in the Two-Party SettingMPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applicationsA secure scalar product protocol against malicious adversariesPrivately Computing Set-Union and Set-Intersection Cardinality via Bloom FiltersA fast and simple partially oblivious PRF, with applicationsPrivate set intersection: new generic constructions and feasibility resultsA Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom FunctionEfficient Computations over Encrypted Data BlocksRound-optimal oblivious transfer and MPC from computational CSIDHZero-Knowledge Accumulators and Set AlgebraAdaptive Oblivious Transfer and GeneralizationSecure two-party input-size reduction: challenges, solutions and applicationsEfficient RSA key generation and threshold Paillier in the two-party settingHow to obfuscate MPC inputsPractical and malicious private set intersection with improved efficiencyMyOPE: malicious security for oblivious polynomial evaluationCryptanalysis of an oblivious PRF from supersingular isogeniesLinear-time 2-party secure merge from additively homomorphic encryptionParaDiSE: efficient threshold authenticated encryption in fully malicious modelOblivious pseudorandom functions from isogeniesEfficient set operations in the presence of malicious adversariesOn the impossibility of structure-preserving deterministic primitivesNew Realizations of Efficient and Secure Private Set Intersection Protocols Preserving FairnessGeneric Fully Simulatable Adaptive Oblivious TransferQuantum secure two-party computation for set intersection with rational playersOblivious polynomial evaluation and secure set-intersection from algebraic PRFsScalable Multi-party Private Set-IntersectionSecure and efficient multiparty private set intersection cardinalityPrivate set-intersection with common set-upA communication-efficient private matching scheme in client-server modelSecure Set Intersection with Untrusted Hardware TokensServer-aided private set intersection based on reputationAdaptive oblivious transfer with access control from lattice assumptionsSimulatable Adaptive Oblivious Transfer with Statistical Receiver’s PrivacyRound-optimal verifiable oblivious pseudorandom functions from ideal latticesTwo-server distributed ORAM with sublinear computation and constant roundsTwo-Message, Oblivious Evaluation of Cryptographic FunctionalitiesTwo-sided malicious security for private intersection-sum with cardinalityPSI from PaXoS: fast, malicious private set intersection




This page was built for publication: Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection