A communication-efficient private matching scheme in client-server model
From MaRDI portal
Publication:726566
DOI10.1016/j.ins.2014.01.016zbMath1341.68046OpenAlexW2016036823MaRDI QIDQ726566
Shih-Ying Chang, Mu-En Wu, Chi-Jen Lu, Hung-Min Sun
Publication date: 11 July 2016
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2014.01.016
communication complexityoblivious transferuniversal hash functionprivate information retrievalprivate matching
Data encryption (aspects in computer science) (68P25) Information storage and retrieval of data (68P20) Authentication, digital signatures and secret sharing (94A62)
Related Items
An efficient quantum scheme for private set intersection ⋮ A novel quantum private set intersection scheme with a semi-honest third party ⋮ Quantum secure multi-party private set intersection cardinality ⋮ Quantum solution to a class of two-party private summation problems ⋮ Cryptanalysis and improvement of a quantum private set intersection protocol ⋮ A novel quantum protocol for private set intersection ⋮ Quantum private set intersection cardinality and its application to anonymous authentication
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- DNA-inspired information concealing: a survey
- Privacy-preserving algorithms for distributed mining of frequent itemsets
- Unconditionally secure disjointness tests for private datasets
- Two methods for privacy preserving data mining with malicious participants
- Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations
- Privacy-preserving disjunctive normal form operations on distributed sets
- Efficient Disjointness Tests for Private Datasets
- Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection
- Private Intersection of Certified Sets
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Advances in Cryptology - EUROCRYPT 2004
- Information Security and Privacy
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- Privacy-Preserving Set Operations
- Probability and Computing
- Secret Handshakes from CA-Oblivious Encryption
- Information Security
- Financial Cryptography and Data Security
- A Survey of Single-Database Private Information Retrieval: Techniques and Applications
- Theory of Cryptography
- Coding and Cryptography