Advances in Cryptology - EUROCRYPT 2004
From MaRDI portal
Publication:5307243
Recommendations
- Efficient set intersection with simulation-based security
- Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- Efficient robust private set intersection
- Scalable multi-party private set-intersection
Cited in
(only showing first 100 items - show all)- Element distinctness and bounded input size in private set intersection and related protocols
- Quantum secure multi-party summation based on entanglement swapping
- Privacy preserving distributed optimization using homomorphic encryption
- Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security
- Privacy-Preserving Set Union
- Hiding the input-size in multi-party private set intersection
- Communication-Efficient Private Protocols for Longest Common Subsequence
- An efficient quantum scheme for private set intersection
- Scalable multi-party private set-intersection
- Quantum secure two-party computation for set intersection with rational players
- Finding one common item, privately
- A novel quantum private set intersection scheme with a semi-honest third party
- Oblivious access control policies for cloud based data sharing systems
- Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
- Efficient set intersection with simulation-based security
- An Unconditionally Secure Protocol for Multi-Party Set Intersection
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets
- A communication-efficient private matching scheme in client-server model
- The communication complexity of threshold private set intersection
- Private set intersection: new generic constructions and feasibility results
- Private subgraph matching protocol
- A novel quantum protocol for private set intersection
- Privacy-preserving subgraph matching protocol for two parties
- Efficient secure multiparty computation of sparse vector dot products
- Private graph intersection protocol
- SE-PSI: fog/cloud server-aided enhanced secure and effective private set intersection on scalable datasets with Bloom Filter
- Quantum protocols for private set intersection cardinality and union cardinality based on entanglement swapping
- Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs
- Multi-party updatable delegated private set intersection
- Fast Private Norm Estimation and Heavy Hitters
- New realizations of efficient and secure private set intersection protocols preserving fairness
- Efficient set operations in the presence of malicious adversaries
- Linear-time 2-party secure merge from additively homomorphic encryption
- Feasible private set intersection in quantum domain
- Quantum multi-party private set intersection using single photons
- Scalable multi-party private set union from multi-query secret-shared private membership test
- Unconditionally secure multiparty computation for symmetric functions with low bottleneck complexity
- Secure and efficient multiparty private set intersection cardinality
- Benaloh's dense probabilistic encryption revisited
- Private polynomial commitments and applications to MPC
- Augmented oblivious polynomial evaluation protocol and its applications
- Polynomial representation is tricky: maliciously secure private set intersection revisited
- Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack
- Attribute-based fine-grained access control for outscored private set intersection computation
- Privacy-preserving blueprints
- Private multiparty sampling and approximation of vector combinations
- Efficient robust private set intersection
- Private intersection of certified sets
- Fast secure computation of set intersection
- Malicious secure, structure-aware private set intersection
- Private computations on set intersection
- Private set-intersection with common set-up
- An efficient approach for secure multi-party computation without authenticated channel
- A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle
- Rate-limited secure function evaluation
- PRUB: A privacy protection friend recommendation system based on user behavior
- Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection
- Privacy Preserving Data Mining within Anonymous Credential Systems
- Secure two-party input-size reduction: challenges, solutions and applications
- Improved private set intersection against malicious adversaries
- Secure multiparty quantum computation for summation and data sorting
- A survey of privacy-preserving mechanisms for heterogeneous data types
- Privately computing set-union and set-intersection cardinality via Bloom filters
- Influence maximization in social networks with privacy protection
- Private set intersection in the internet setting from lightweight oblivious PRF
- Certifying equality with limited interaction
- PSI from PaXoS: fast, malicious private set intersection
- Quantum multi-party private set union protocol based on least common multiple and Shor’s algorithm
- Fuzzy private set intersection with large hyperballs
- Multiparty cardinality testing for threshold private intersection
- Multi-party threshold private set intersection with sublinear communication
- Private set operations from oblivious switching
- Bounded size-hiding private set intersection
- Server-aided private set intersection based on reputation
- Two-sided malicious security for private intersection-sum with cardinality
- Oblivious key-value stores and amplification for private set intersection
- Very fast construction of bounded‐degree spanning graphs via the semi‐random graph process
- Privacy-preserving fingerprint authentication resistant to hill-climbing attacks
- Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation
- Efficient Concurrent Covert Computation of String Equality and Set Intersection
- Functional encryption for set intersection in the multi-client setting
- Proving possession of arbitrary secrets while not giving them away: New protocols and a proof in GNY logic
- Secure set intersection with untrusted hardware tokens
- Structure-aware private set intersection, with applications to fuzzy matching
- Two-client and multi-client functional encryption for set intersection
- Computation efficient structure-aware PSI from incremental function secret sharing
- Financial Cryptography and Data Security
- Decentralized multi-client functional encryption for set intersection with improved efficiency
- Multiparty proximity testing with dishonest majority from equality testing
- Mixed-technique multi-party computations composed of two-party computations
- Threshold private set intersection with better communication complexity
- Quantum solution to a class of two-party private summation problems
- Cryptanalysis and improvement of a quantum private set intersection protocol
- Efficient private set intersection cardinality protocol in the reverse unbalanced setting
- Symmetric cryptographic protocols for extended millionaires' problem
- Zero-Knowledge Accumulators and Set Algebra
- Efficient Disjointness Tests for Private Datasets
- Comparing two sets without disclosing them
- Practical and malicious private set intersection with improved efficiency
This page was built for publication: Advances in Cryptology - EUROCRYPT 2004
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5307243)