Efficient set operations in the presence of malicious adversaries (Q3562905)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Efficient set operations in the presence of malicious adversaries |
scientific article; zbMATH DE number 5713638
| Language | Label | Description | Also known as |
|---|---|---|---|
| default for all languages | No label defined |
||
| English | Efficient set operations in the presence of malicious adversaries |
scientific article; zbMATH DE number 5713638 |
Statements
Efficient Set Operations in the Presence of Malicious Adversaries (English)
0 references
28 May 2010
0 references
secure two-party computation
0 references
simulation based security
0 references
set intersection
0 references
set union
0 references
oblivious pseudorandom function evaluation
0 references
0.9952346086502076
0 references
0.8530193567276001
0 references
0.8526682257652283
0 references
0.824769139289856
0 references
0.8183656930923462
0 references