Private set-intersection with common set-up
From MaRDI portal
Recommendations
- Private set intersection: new generic constructions and feasibility results
- Linear-complexity private set intersection protocols secure in malicious model
- Private set intersection in the internet setting from lightweight oblivious PRF
- Nothing refreshes like a RePSI: reactive private set intersection
- Scalable multi-party private set-intersection
Cites work
- scientific article; zbMATH DE number 1722690 (Why is no real title available?)
- scientific article; zbMATH DE number 3825707 (Why is no real title available?)
- scientific article; zbMATH DE number 1088232 (Why is no real title available?)
- scientific article; zbMATH DE number 1759781 (Why is no real title available?)
- scientific article; zbMATH DE number 1775427 (Why is no real title available?)
- scientific article; zbMATH DE number 2086716 (Why is no real title available?)
- (If) size matters: size-hiding private set intersection
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
- Efficient robust private set intersection
- Efficient set operations in the presence of malicious adversaries
- Fast secure computation of set intersection
- Foundations of Cryptography
- Linear-complexity private set intersection protocols secure in malicious model
- Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs
- Policy-enhanced private set intersection: sharing information while enforcing privacy policies
- Privacy preserving data mining
- Privacy-Preserving Set Operations
- Private intersection of certified sets
- Security and composition of multiparty cryptographic protocols
- Structure-preserving signatures and commitments to group elements
- The exact security of digital signatures -- how to sign with RSA and Rabin
- The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
Cited in
(4)
This page was built for publication: Private set-intersection with common set-up
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1783703)