Hiding the input-size in multi-party private set intersection
From MaRDI portal
Publication:6048707
DOI10.1007/s10623-023-01238-0zbMath1520.94071OpenAlexW4377989112MaRDI QIDQ6048707
Qian Liu, Baocang Wang, Yu Zhan, Ziqian Zhang
Publication date: 7 September 2023
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-023-01238-0
Cites Work
- Unnamed Item
- On the false-positive rate of Bloom filters
- Nothing refreshes like a RePSI: reactive private set intersection
- An efficient toolkit for computing private set operations
- Secure and efficient multiparty private set intersection cardinality
- VOLE-PSI: fast OPRF and circuit-PSI from vector-OLE
- Multiparty cardinality testing for threshold private intersection
- Multi-party threshold private set intersection with sublinear communication
- Two-sided malicious security for private intersection-sum with cardinality
- Private set intersection in the internet setting from lightweight oblivious PRF
- PSI from PaXoS: fast, malicious private set intersection
- Oblivious key-value stores and amplification for private set intersection
- Polynomial representation is tricky: maliciously secure private set intersection revisited
- Efficient circuit-based PSI with linear communication
- An algebraic approach to maliciously secure private set intersection
- SpOT-light: lightweight private set intersection from sparse OT extension
- The communication complexity of threshold private set intersection
- Laconic private set intersection and applications
- Bounded Size-Hiding Private Set Intersection
- Hiding the Input-Size in Secure Two-Party Computation
- Size-Hiding in Private Set Intersection: Existential Results and Constructions
- Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World
- Size-Hiding Computation for Multiple Parties
- (If) Size Matters: Size-Hiding Private Set Intersection
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Foundations of Cryptography
- Advances in Cryptology - EUROCRYPT 2004
- Privacy-Preserving Set Operations
- Space/time trade-offs in hash coding with allowable errors
- Scalable Multi-party Private Set-Intersection
- Improved Private Set Intersection Against Malicious Adversaries
- Multi-party updatable delegated private set intersection
This page was built for publication: Hiding the input-size in multi-party private set intersection