Private set intersection in the internet setting from lightweight oblivious PRF
From MaRDI portal
Publication:2102052
Recommendations
- SpOT-light: lightweight private set intersection from sparse OT extension
- Efficient circuit-based PSI with linear communication
- Private set intersection: new generic constructions and feasibility results
- Linear-complexity private set intersection protocols secure in malicious model
- Faster unbalanced private set intersection
Cites work
- (If) size matters: size-hiding private set intersection
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - EUROCRYPT 2004
- An algebraic approach to maliciously secure private set intersection
- Cuckoo hashing
- Efficient circuit-based PSI via cuckoo hashing
- Improved OT extension for transferring short secrets
- Improved private set intersection against malicious adversaries
- Linear-complexity private set intersection protocols secure in malicious model
- Oblivious transfer and polynomial evaluation
- PSI from PaXoS: fast, malicious private set intersection
- SpOT-light: lightweight private set intersection from sparse OT extension
- The security of the cipher block chaining message authentication code
- Theory of Cryptography
Cited in
(44)- PSI-stats: private set intersection protocols supporting secure statistical functions
- Improved private set intersection for sets with small entries
- Predicate private set intersection with linear complexity
- Multi-party threshold private set intersection with sublinear communication
- Private set operations from oblivious switching
- Streaming and unbalanced PSI from function secret sharing
- Private polynomial commitments and applications to MPC
- Scalable private set union from symmetric-key techniques
- (If) size matters: size-hiding private set intersection
- Bounded size-hiding private set intersection
- Amortizing rate-1 OT and applications to PIR and PSI
- Malicious secure, structure-aware private set intersection
- Computation efficient structure-aware PSI from incremental function secret sharing
- Private computations on set intersection
- Multi-party updatable delegated private set intersection
- An algebraic approach to maliciously secure private set intersection
- Element distinctness and bounded input size in private set intersection and related protocols
- Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection
- Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation
- VOLE-PSI: fast OPRF and circuit-PSI from vector-OLE
- Linear Complexity Private Set Intersection for Secure Two-Party Protocols
- A fair and efficient mutual private set intersection protocol from a two-way oblivious pseudorandom function
- Nothing refreshes like a RePSI: reactive private set intersection
- Improved circuit-based PSI via equality preserving compression
- Two-sided malicious security for private intersection-sum with cardinality
- SpOT-light: lightweight private set intersection from sparse OT extension
- Hiding the input-size in multi-party private set intersection
- Efficient circuit-based PSI with linear communication
- Privacy-preserving blueprints
- Faster unbalanced private set intersection
- Adaptively code-correlation robustness functions and its applications to private set intersection
- Scalable multi-party private set union from multi-query secret-shared private membership test
- Private set operations from multi-query reverse private membership test
- Oblivious key-value stores and amplification for private set intersection
- Fuzzy private set intersection with large hyperballs
- Lower-bounds on public-key operations in PIR
- Finding one common item, privately
- Combining private set intersection with secure two-party computation
- SE-PSI: fog/cloud server-aided enhanced secure and effective private set intersection on scalable datasets with Bloom Filter
- PSI from PaXoS: fast, malicious private set intersection
- Structure-aware private set intersection, with applications to fuzzy matching
- Private set-intersection with common set-up
- Private set intersection: new generic constructions and feasibility results
- Polynomial representation is tricky: maliciously secure private set intersection revisited
This page was built for publication: Private set intersection in the internet setting from lightweight oblivious PRF
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2102052)