Privacy-Preserving Set Operations
From MaRDI portal
Publication:5451029
Recommendations
Cited in
(69)- Linear-time 2-party secure merge from additively homomorphic encryption
- Malicious secure, structure-aware private set intersection
- Computation efficient structure-aware PSI from incremental function secret sharing
- Private computations on set intersection
- Element distinctness and bounded input size in private set intersection and related protocols
- Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation
- Width-based search for multi agent privacy-preserving planning
- Quantum multi-party private set union protocol based on least common multiple and Shor’s algorithm
- Mixed-technique multi-party computations composed of two-party computations
- Scalable multi-party private set union from multi-query secret-shared private membership test
- Unconditionally secure multiparty computation for symmetric functions with low bottleneck complexity
- Private set operations from multi-query reverse private membership test
- Finding one common item, privately
- Structure-aware private set intersection, with applications to fuzzy matching
- Practical and malicious private set intersection with improved efficiency
- Complementary set encryption for privacy-preserving data consolidation
- Applied Cryptography and Network Security
- Improved private set intersection for sets with small entries
- VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets
- Privacy-preserving subgraph matching protocol for two parties
- Multiparty cardinality testing for threshold private intersection
- Multi-party threshold private set intersection with sublinear communication
- Private set operations from oblivious switching
- Secure set intersection with untrusted hardware tokens
- Efficient set intersection with simulation-based security
- Privacy Preserving Data Mining within Anonymous Credential Systems
- ANALYSIS OF PRIVACY-PRESERVING ELEMENT REDUCTION OF A MULTISET
- Efficient Disjointness Tests for Private Datasets
- Laconic private set intersection and applications
- Zero-knowledge succinct non-interactive arguments of knowledge based on sets of polynomials
- Multi-party updatable delegated private set intersection
- Quantum secure multi-party private set intersection cardinality
- Applying secure multi-party computation in practice
- A communication-efficient private matching scheme in client-server model
- Provably secure fair mutual private set intersection cardinality utilizing Bloom filter
- New realizations of efficient and secure private set intersection protocols preserving fairness
- Provably secure threshold paillier encryption based on hyperplane geometry
- Confidential gossip
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- Zero-Knowledge Accumulators and Set Algebra
- Server-aided private set intersection based on reputation
- A fair and efficient mutual private set intersection protocol from a two-way oblivious pseudorandom function
- Privately computing set-union and set-intersection cardinality via Bloom filters
- Scalable multi-party private set-intersection
- Two-sided malicious security for private intersection-sum with cardinality
- Providing accurate models across private partitioned data: secure maximum likelihood estimation
- Secure and efficient multiparty private set intersection cardinality
- Hiding the input-size in multi-party private set intersection
- Oblivious key-value stores and amplification for private set intersection
- Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups
- Lightweight delegated subset test with privacy protection
- An efficient toolkit for computing private set operations
- Constant-round privacy preserving multiset union
- Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
- Privacy-preserving mixed set operations
- PRUB: A privacy protection friend recommendation system based on user behavior
- Quantum private set intersection cardinality and its application to anonymous authentication
- Private set-intersection with common set-up
- Privacy-Preserving Set Union
- Implementing secure reporting of sexual misconduct -- revisiting WhoToo
- Fair Threshold Decryption with Semi-Trusted Third Parties
- Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs
- Analysis of Gong et al.'s CCA2-secure homomorphic encryption
- Private set intersection: new generic constructions and feasibility results
- Privacy-preserving disjunctive normal form operations on distributed sets
- Efficient set operations in the presence of malicious adversaries
- Attribute-based fine-grained access control for outscored private set intersection computation
- Polynomial representation is tricky: maliciously secure private set intersection revisited
- Threshold private set intersection with better communication complexity
This page was built for publication: Privacy-Preserving Set Operations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451029)