Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries

From MaRDI portal
Publication:5445504

DOI10.1007/978-3-540-78524-8_10zbMath1162.94367OpenAlexW1544695791MaRDI QIDQ5445504

Carmit Hazay, Yehuda Lindell

Publication date: 5 March 2008

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-78524-8_10




Related Items (26)

An efficient quantum scheme for private set intersectionEfficient set intersection with simulation-based securityAn Efficient Protocol for Oblivious DFA Evaluation and ApplicationsAutomata evaluation and text search protocols with simulation-based securityRate-limited secure function evaluationSecure parameterized pattern matchingPrivate set intersection: new generic constructions and feasibility resultsMalicious secure, structure-aware private set intersectionDecentralized multi-client functional encryption for set intersection with improved efficiencyEfficient set operations in the presence of malicious adversariesOn the impossibility of structure-preserving deterministic primitivesNew Realizations of Efficient and Secure Private Set Intersection Protocols Preserving FairnessImplementing Two-Party Computation Efficiently with Security Against Malicious AdversariesA novel quantum protocol for private set intersectionQuantum secure two-party computation for set intersection with rational playersRate-Limited Secure Function Evaluation: Definitions and ConstructionsSecure and efficient multiparty private set intersection cardinalityPrivate set-intersection with common set-upA communication-efficient private matching scheme in client-server modelEfficient protocols for set intersection and pattern matching with security against malicious and covert adversariesPRUB: A privacy protection friend recommendation system based on user behaviorSecure Set Intersection with Untrusted Hardware TokensServer-aided private set intersection based on reputationComputationally secure pattern matching in the presence of malicious adversariesBounded Size-Hiding Private Set IntersectionTwo-sided malicious security for private intersection-sum with cardinality



Cites Work




This page was built for publication: Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries