Polynomial representation is tricky: maliciously secure private set intersection revisited
From MaRDI portal
Publication:2148772
DOI10.1007/978-3-030-88428-4_35zbMATH Open1498.94050OpenAlexW3201965566MaRDI QIDQ2148772FDOQ2148772
Authors: Aydin Abadi, Steven J. Murdoch, Thomas Zacharias
Publication date: 24 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-88428-4_35
Recommendations
- An algebraic approach to maliciously secure private set intersection
- Improved private set intersection against malicious adversaries
- Linear-complexity private set intersection protocols secure in malicious model
- PSI from PaXoS: fast, malicious private set intersection
- Efficient private set intersection cardinality in the presence of malicious adversaries
Cryptography (94A60) Modes of computation (nondeterministic, parallel, interactive, probabilistic, etc.) (68Q10) Authentication, digital signatures and secret sharing (94A62) Privacy of data (68P27)
Cites Work
- Title not available (Why is that?)
- How to share a secret
- Polynomial Codes Over Certain Finite Fields
- Advances in Cryptology - EUROCRYPT 2004
- Private intersection of certified sets
- Privacy-Preserving Set Operations
- Title not available (Why is that?)
- Private Database Queries Using Somewhat Homomorphic Encryption
- An algebraic approach to maliciously secure private set intersection
- Efficient scalable multiparty private set-intersection via garbled Bloom filters
- The communication complexity of threshold private set intersection
- Scalable Multi-party Private Set-Intersection
- Maliciously secure oblivious linear function evaluation with constant overhead
- Private set intersection in the internet setting from lightweight oblivious PRF
- PSI from PaXoS: fast, malicious private set intersection
- \textsf{Catalic}: delegated PSI cardinality with applications to contact tracing
- Title not available (Why is that?)
- VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets
Cited In (4)
This page was built for publication: Polynomial representation is tricky: maliciously secure private set intersection revisited
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2148772)