Malicious secure, structure-aware private set intersection
From MaRDI portal
Publication:6186605
Recommendations
- Computation efficient structure-aware PSI from incremental function secret sharing
- Structure-aware private set intersection, with applications to fuzzy matching
- Linear-complexity private set intersection protocols secure in malicious model
- Improved private set intersection against malicious adversaries
- PSI from PaXoS: fast, malicious private set intersection
Cites work
- scientific article; zbMATH DE number 1030984 (Why is no real title available?)
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - EUROCRYPT 2004
- An algebraic approach to maliciously secure private set intersection
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- Efficient circuit-based PSI via cuckoo hashing
- Efficient circuit-based PSI with linear communication
- Efficient pseudorandom correlation generators: silent OT extension and more
- Fast secure computation of set intersection
- Function secret sharing
- Function secret sharing for mixed-mode and fixed-point secure computation
- Improved private set intersection against malicious adversaries
- Lightweight, maliciously secure verifiable function secret sharing
- Linear-complexity private set intersection protocols secure in malicious model
- Oblivious key-value stores and amplification for private set intersection
- On the complexity of additively homomorphic UC commitments
- PSI from PaXoS: fast, malicious private set intersection
- Privacy-Preserving Set Operations
- Private set intersection in the internet setting from lightweight oblivious PRF
- Private set operations from oblivious switching
- Programmable distributed point functions
- Secure computation with preprocessing via function secret sharing
- Silver: silent VOLE and oblivious transfer from hardness of decoding structured LDPC codes
- SpOT-light: lightweight private set intersection from sparse OT extension
- Structure-aware private set intersection, with applications to fuzzy matching
- Theory of Cryptography
- VOLE-PSI: fast OPRF and circuit-PSI from vector-OLE
Cited in
(3)
This page was built for publication: Malicious secure, structure-aware private set intersection
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6186605)