Advances in Cryptology - EUROCRYPT 2004
From MaRDI portal
Publication:5307243
Recommendations
- Efficient set intersection with simulation-based security
- Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- Efficient robust private set intersection
- Scalable multi-party private set-intersection
Cited in
(only showing first 100 items - show all)- The communication complexity of threshold private set intersection
- PSI-stats: private set intersection protocols supporting secure statistical functions
- Fast secure computation of set intersection
- Multiparty cardinality testing for threshold private intersection
- Multi-party threshold private set intersection with sublinear communication
- Private set operations from oblivious switching
- Efficient set intersection with simulation-based security
- Private polynomial commitments and applications to MPC
- Efficient Disjointness Tests for Private Datasets
- Quantum secure multi-party summation based on entanglement swapping
- Certifying equality with limited interaction
- Efficient secure multiparty computation of sparse vector dot products
- A communication-efficient private matching scheme in client-server model
- A novel quantum protocol for private set intersection
- Comparing two sets without disclosing them
- Quantum secure two-party computation for set intersection with rational players
- Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security
- New realizations of efficient and secure private set intersection protocols preserving fairness
- Efficient Concurrent Covert Computation of String Equality and Set Intersection
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- Efficient private set intersection cardinality protocol in the reverse unbalanced setting
- Server-aided private set intersection based on reputation
- Augmented oblivious polynomial evaluation protocol and its applications
- Privately computing set-union and set-intersection cardinality via Bloom filters
- Private subgraph matching protocol
- Scalable multi-party private set-intersection
- Two-sided malicious security for private intersection-sum with cardinality
- Benaloh's dense probabilistic encryption revisited
- Secure and efficient multiparty private set intersection cardinality
- Fast Private Norm Estimation and Heavy Hitters
- Symmetric cryptographic protocols for extended millionaires' problem
- A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle
- Privacy preserving distributed optimization using homomorphic encryption
- An Unconditionally Secure Protocol for Multi-Party Set Intersection
- Private intersection of certified sets
- Oblivious key-value stores and amplification for private set intersection
- Influence maximization in social networks with privacy protection
- Feasible private set intersection in quantum domain
- Financial Cryptography and Data Security
- SE-PSI: fog/cloud server-aided enhanced secure and effective private set intersection on scalable datasets with Bloom Filter
- Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack
- Oblivious access control policies for cloud based data sharing systems
- Private set intersection in the internet setting from lightweight oblivious PRF
- Private graph intersection protocol
- Functional encryption for set intersection in the multi-client setting
- Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
- Private multiparty sampling and approximation of vector combinations
- Rate-limited secure function evaluation
- Two-client and multi-client functional encryption for set intersection
- PRUB: A privacy protection friend recommendation system based on user behavior
- An efficient quantum scheme for private set intersection
- PSI from PaXoS: fast, malicious private set intersection
- Efficient robust private set intersection
- Quantum private set intersection cardinality and its application to anonymous authentication
- Private set-intersection with common set-up
- Privacy-preserving fingerprint authentication resistant to hill-climbing attacks
- Proving possession of arbitrary secrets while not giving them away: New protocols and a proof in GNY logic
- Quantum solution to a class of two-party private summation problems
- Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs
- Cryptanalysis and improvement of a quantum private set intersection protocol
- Private set intersection: new generic constructions and feasibility results
- Efficient set operations in the presence of malicious adversaries
- Improved private set intersection against malicious adversaries
- Polynomial representation is tricky: maliciously secure private set intersection revisited
- Threshold private set intersection with better communication complexity
- An efficient approach for secure multi-party computation without authenticated channel
- A survey of privacy-preserving mechanisms for heterogeneous data types
- VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets
- Linear-time 2-party secure merge from additively homomorphic encryption
- Privacy-preserving subgraph matching protocol for two parties
- Secure set intersection with untrusted hardware tokens
- Streaming and unbalanced PSI from function secret sharing
- Privacy Preserving Data Mining within Anonymous Credential Systems
- Communication-Efficient Private Protocols for Longest Common Subsequence
- Bounded size-hiding private set intersection
- Malicious secure, structure-aware private set intersection
- Computation efficient structure-aware PSI from incremental function secret sharing
- Private computations on set intersection
- Multi-party updatable delegated private set intersection
- Element distinctness and bounded input size in private set intersection and related protocols
- Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation
- Zero-Knowledge Accumulators and Set Algebra
- Quantum multi-party private set union protocol based on least common multiple and Shor’s algorithm
- Hiding the input-size in multi-party private set intersection
- Privacy-preserving blueprints
- Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection
- Quantum multi-party private set intersection using single photons
- Mixed-technique multi-party computations composed of two-party computations
- Scalable multi-party private set union from multi-query secret-shared private membership test
- Unconditionally secure multiparty computation for symmetric functions with low bottleneck complexity
- Fuzzy private set intersection with large hyperballs
- Finding one common item, privately
- Very fast construction of bounded‐degree spanning graphs via the semi‐random graph process
- A novel quantum private set intersection scheme with a semi-honest third party
- Quantum protocols for private set intersection cardinality and union cardinality based on entanglement swapping
- Secure two-party input-size reduction: challenges, solutions and applications
- Secure multiparty quantum computation for summation and data sorting
- Structure-aware private set intersection, with applications to fuzzy matching
- Privacy-Preserving Set Union
- Multiparty proximity testing with dishonest majority from equality testing
This page was built for publication: Advances in Cryptology - EUROCRYPT 2004
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5307243)