Efficient Set Operations in the Presence of Malicious Adversaries
From MaRDI portal
Publication:3562905
DOI10.1007/978-3-642-13013-7_19zbMath1281.94029OpenAlexW1882685508MaRDI QIDQ3562905
Publication date: 28 May 2010
Published in: Public Key Cryptography – PKC 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13013-7_19
set intersectionsecure two-party computationset unionsimulation based securityoblivious pseudorandom function evaluation
Related Items (9)
Efficient set intersection with simulation-based security ⋮ Secure two-party computation via cut-and-choose oblivious transfer ⋮ Practical and malicious private set intersection with improved efficiency ⋮ New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness ⋮ Rate-Limited Secure Function Evaluation: Definitions and Constructions ⋮ Secure and efficient multiparty private set intersection cardinality ⋮ Private set-intersection with common set-up ⋮ Secure Set Intersection with Untrusted Hardware Tokens ⋮ Two-sided malicious security for private intersection-sum with cardinality
This page was built for publication: Efficient Set Operations in the Presence of Malicious Adversaries