Bounded Size-Hiding Private Set Intersection
From MaRDI portal
Publication:2827733
DOI10.1007/978-3-319-44618-9_24zbMath1482.94043OpenAlexW2509951678MaRDI QIDQ2827733
Tatiana Bradley, Sky Faber, Gene Tsudik
Publication date: 21 October 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-44618-9_24
Related Items
Generating Random SAT Instances: Multiple Solutions could be Predefined and Deeply Hidden, Hiding the input-size in multi-party private set intersection, Bounded Size-Hiding Private Set Intersection
Cites Work
- Probabilistic encryption
- Efficient robust private set intersection
- Bounded Size-Hiding Private Set Intersection
- Hiding the Input-Size in Secure Two-Party Computation
- Size-Hiding in Private Set Intersection: Existential Results and Constructions
- Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World
- Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
- (If) Size Matters: Size-Hiding Private Set Intersection
- Evaluating Branching Programs on Encrypted Data
- Foundations of Cryptography
- Black-box non-black-box zero knowledge
- Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- Topics in Cryptology – CT-RSA 2005