Advances in Cryptology - EUROCRYPT 2004
From MaRDI portal
Publication:5307243
DOI10.1007/B97182zbMATH Open1122.94416DBLPconf/eurocrypt/2004OpenAlexW2477185671MaRDI QIDQ5307243FDOQ5307243
Kobbi Nissim, Benny Pinkas, Michael J. Freedman
Publication date: 25 September 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b97182
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Cited In (92)
- An efficient quantum scheme for private set intersection
- Augmented Oblivious Polynomial Evaluation Protocol and Its Applications
- Quantum secure two-party computation for set intersection with rational players
- Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- Oblivious access control policies for cloud based data sharing systems
- VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets
- Efficient set intersection with simulation-based security
- Multiparty Proximity Testing with Dishonest Majority from Equality Testing
- A communication-efficient private matching scheme in client-server model
- Private set intersection: new generic constructions and feasibility results
- A novel quantum protocol for private set intersection
- Efficient secure multiparty computation of sparse vector dot products
- Benaloh’s Dense Probabilistic Encryption Revisited
- Fast Private Norm Estimation and Heavy Hitters
- Quantum protocols for private set intersection cardinality and union cardinality based on entanglement swapping
- SE-PSI: fog/cloud server-aided enhanced secure and effective private set intersection on scalable datasets with Bloom Filter
- Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs
- Feasible private set intersection in quantum domain
- Improved Private Set Intersection Against Malicious Adversaries
- Efficient set operations in the presence of malicious adversaries
- Private polynomial commitments and applications to MPC
- Secure and efficient multiparty private set intersection cardinality
- Polynomial representation is tricky: maliciously secure private set intersection revisited
- Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack
- Attribute-based fine-grained access control for outscored private set intersection computation
- Private multiparty sampling and approximation of vector combinations
- Private set-intersection with common set-up
- An efficient approach for secure multi-party computation without authenticated channel
- A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle
- New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness
- Rate-limited secure function evaluation
- PRUB: A privacy protection friend recommendation system based on user behavior
- Influence maximization in social networks with privacy protection
- Private set intersection in the internet setting from lightweight oblivious PRF
- PSI from PaXoS: fast, malicious private set intersection
- Certifying equality with limited interaction
- Multiparty cardinality testing for threshold private intersection
- Multi-party threshold private set intersection with sublinear communication
- Private set operations from oblivious switching
- Server-aided private set intersection based on reputation
- Two-sided malicious security for private intersection-sum with cardinality
- Oblivious key-value stores and amplification for private set intersection
- Efficient Concurrent Covert Computation of String Equality and Set Intersection
- Functional encryption for set intersection in the multi-client setting
- Proving possession of arbitrary secrets while not giving them away: New protocols and a proof in GNY logic
- Scalable Multi-party Private Set-Intersection
- Threshold private set intersection with better communication complexity
- Efficient private set intersection cardinality protocol in the reverse unbalanced setting
- Quantum solution to a class of two-party private summation problems
- Cryptanalysis and improvement of a quantum private set intersection protocol
- Zero-Knowledge Accumulators and Set Algebra
- Symmetric cryptographic protocols for extended millionaires' problem
- Efficient Disjointness Tests for Private Datasets
- Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters
- Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks
- Comparing two sets without disclosing them
- Quantum private set intersection cardinality and its application to anonymous authentication
- PSI-stats: private set intersection protocols supporting secure statistical functions
- Quantum secure multi-party summation based on entanglement swapping
- Privacy preserving distributed optimization using homomorphic encryption
- Hiding the input-size in multi-party private set intersection
- Privacy-Preserving Set Union
- Communication-Efficient Private Protocols for Longest Common Subsequence
- Secure Set Intersection with Untrusted Hardware Tokens
- Finding one common item, privately
- A novel quantum private set intersection scheme with a semi-honest third party
- Multi-party updatable delegated private set intersection
- Linear-time 2-party secure merge from additively homomorphic encryption
- Quantum multi-party private set intersection using single photons
- Scalable multi-party private set union from multi-query secret-shared private membership test
- Unconditionally secure multiparty computation for symmetric functions with low bottleneck complexity
- Privacy-preserving blueprints
- Malicious secure, structure-aware private set intersection
- Private computations on set intersection
- Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection
- Secure multiparty quantum computation for summation and data sorting
- Privacy Preserving Data Mining within Anonymous Credential Systems
- A survey of privacy-preserving mechanisms for heterogeneous data types
- Quantum multi-party private set union protocol based on least common multiple and Shor’s algorithm
- Fuzzy private set intersection with large hyperballs
- Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation
- Very fast construction of bounded‐degree spanning graphs via the semi‐random graph process
- Structure-aware private set intersection, with applications to fuzzy matching
- Computation efficient structure-aware PSI from incremental function secret sharing
- Mixed-technique multi-party computations composed of two-party computations
- Privacy-Preserving Subgraph Matching Protocol for Two Parties
- Decentralized multi-client functional encryption for set intersection with improved efficiency
- Bounded Size-Hiding Private Set Intersection
- Practical and malicious private set intersection with improved efficiency
- Streaming and unbalanced PSI from function secret sharing
- Element distinctness and bounded input size in private set intersection and related protocols
This page was built for publication: Advances in Cryptology - EUROCRYPT 2004
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5307243)