Practically efficient private set intersection from trusted hardware with side-channels
From MaRDI portal
Publication:6604877
Recommendations
- Secure set intersection with untrusted hardware tokens
- Linear-complexity private set intersection protocols secure in malicious model
- Improved private set intersection against malicious adversaries
- Private set intersection: new generic constructions and feasibility results
- Improved private set intersection for sets with small entries
Cites work
- scientific article; zbMATH DE number 1775406 (Why is no real title available?)
- scientific article; zbMATH DE number 2086716 (Why is no real title available?)
- scientific article; zbMATH DE number 1842484 (Why is no real title available?)
- (If) size matters: size-hiding private set intersection
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- Formal abstractions for attested execution secure processors
- Improved private set intersection against malicious adversaries
- Long-term security and universal composability
- New directions in cryptography
- Oblivious key-value stores and amplification for private set intersection
- PSI from PaXoS: fast, malicious private set intersection
- Steel: composable hardware-based stateful and randomised functional encryption
- The wonderful world of global random oracles
- Theory of Cryptography
- Universal classes of hash functions
- Universal composition with global subroutines: capturing global setup within plain UC
- Universally Composable Security with Global Setup
- Universally composable security
- \textsf{Catalic}: delegated PSI cardinality with applications to contact tracing
This page was built for publication: Practically efficient private set intersection from trusted hardware with side-channels
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6604877)