Malicious secure, structure-aware private set intersection
From MaRDI portal
Publication:6186605
DOI10.1007/978-3-031-38557-5_19OpenAlexW4385654372MaRDI QIDQ6186605FDOQ6186605
Jaspal Singh, Gayathri Garimella, Mike Rosulek
Publication date: 2 February 2024
Published in: Advances in Cryptology – CRYPTO 2023 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-38557-5_19
Cites Work
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- Fast Secure Computation of Set Intersection
- Privacy-Preserving Set Operations
- Theory of Cryptography
- Advances in Cryptology - CRYPTO 2003
- Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
- Title not available (Why is that?)
- Efficient circuit-based PSI via cuckoo hashing
- Function Secret Sharing
- Efficient circuit-based PSI with linear communication
- Function secret sharing for mixed-mode and fixed-point secure computation
- Secure computation with preprocessing via function secret sharing
- On the Complexity of Additively Homomorphic UC Commitments
- An algebraic approach to maliciously secure private set intersection
- VOLE-PSI: fast OPRF and circuit-PSI from vector-OLE
- Private set intersection in the internet setting from lightweight oblivious PRF
- PSI from PaXoS: fast, malicious private set intersection
- SpOT-light: lightweight private set intersection from sparse OT extension
- Efficient pseudorandom correlation generators: silent OT extension and more
- Improved Private Set Intersection Against Malicious Adversaries
- Private set operations from oblivious switching
- Oblivious key-value stores and amplification for private set intersection
- Silver: silent VOLE and oblivious transfer from hardness of decoding structured LDPC codes
- Lightweight, maliciously secure verifiable function secret sharing
- Programmable distributed point functions
- Structure-aware private set intersection, with applications to fuzzy matching
Cited In (3)
This page was built for publication: Malicious secure, structure-aware private set intersection
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6186605)