Polynomial representation is tricky: maliciously secure private set intersection revisited
From MaRDI portal
Publication:2148772
Recommendations
- An algebraic approach to maliciously secure private set intersection
- Improved private set intersection against malicious adversaries
- Linear-complexity private set intersection protocols secure in malicious model
- PSI from PaXoS: fast, malicious private set intersection
- Efficient private set intersection cardinality in the presence of malicious adversaries
Cites work
- scientific article; zbMATH DE number 1722672 (Why is no real title available?)
- scientific article; zbMATH DE number 3511563 (Why is no real title available?)
- scientific article; zbMATH DE number 1462120 (Why is no real title available?)
- Advances in Cryptology - EUROCRYPT 2004
- An algebraic approach to maliciously secure private set intersection
- Efficient scalable multiparty private set-intersection via garbled Bloom filters
- How to share a secret
- Maliciously secure oblivious linear function evaluation with constant overhead
- PSI from PaXoS: fast, malicious private set intersection
- Polynomial Codes Over Certain Finite Fields
- Privacy-Preserving Set Operations
- Private database queries using somewhat homomorphic encryption
- Private intersection of certified sets
- Private set intersection in the internet setting from lightweight oblivious PRF
- Scalable multi-party private set-intersection
- The communication complexity of threshold private set intersection
- VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets
- \textsf{Catalic}: delegated PSI cardinality with applications to contact tracing
Cited in
(5)- Improved private set intersection for sets with small entries
- Multi-party updatable delegated private set intersection
- Invertible polynomial representation for private set operations
- Hiding the input-size in multi-party private set intersection
- Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs
This page was built for publication: Polynomial representation is tricky: maliciously secure private set intersection revisited
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2148772)