The following pages link to Privacy-Preserving Set Operations (Q5451029):
Displaying 50 items.
- Efficient set intersection with simulation-based security (Q271588) (← links)
- Efficient set operations in the presence of malicious adversaries (Q434343) (← links)
- A communication-efficient private matching scheme in client-server model (Q726566) (← links)
- Providing accurate models across private partitioned data: secure maximum likelihood estimation (Q1624813) (← links)
- Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs (Q1753171) (← links)
- Private set-intersection with common set-up (Q1783703) (← links)
- PRUB: A privacy protection friend recommendation system based on user behavior (Q1793689) (← links)
- Secure and efficient multiparty private set intersection cardinality (Q2025374) (← links)
- Multiparty cardinality testing for threshold private intersection (Q2061947) (← links)
- Multi-party threshold private set intersection with sublinear communication (Q2061962) (← links)
- Private set operations from oblivious switching (Q2061976) (← links)
- Two-sided malicious security for private intersection-sum with cardinality (Q2102051) (← links)
- Oblivious key-value stores and amplification for private set intersection (Q2128570) (← links)
- Implementing secure reporting of sexual misconduct -- revisiting WhoToo (Q2146102) (← links)
- Polynomial representation is tricky: maliciously secure private set intersection revisited (Q2148772) (← links)
- Quantum secure multi-party private set intersection cardinality (Q2196982) (← links)
- Confidential gossip (Q2204776) (← links)
- Quantum private set intersection cardinality and its application to anonymous authentication (Q2282131) (← links)
- Server-aided private set intersection based on reputation (Q2293036) (← links)
- Private set intersection: new generic constructions and feasibility results (Q2408281) (← links)
- Analysis of Gong et al.'s CCA2-secure homomorphic encryption (Q2629237) (← links)
- Privacy-preserving mixed set operations (Q2663573) (← links)
- Attribute-based fine-grained access control for outscored private set intersection computation (Q2666793) (← links)
- Laconic private set intersection and applications (Q2697887) (← links)
- Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry (Q2817804) (← links)
- A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom Function (Q2942846) (← links)
- Zero-Knowledge Accumulators and Set Algebra (Q2953773) (← links)
- Provably Secure Fair Mutual Private Set Intersection Cardinality Utilizing Bloom Filter (Q2980879) (← links)
- New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness (Q2988351) (← links)
- Secure Set Intersection with Untrusted Hardware Tokens (Q3073691) (← links)
- Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters (Q3194620) (← links)
- Efficient Disjointness Tests for Private Datasets (Q3511159) (← links)
- Privacy Preserving Data Mining within Anonymous Credential Systems (Q3540036) (← links)
- Fair Threshold Decryption with Semi-Trusted Third Parties (Q3634502) (← links)
- Privacy-Preserving Subgraph Matching Protocol for Two Parties (Q5205011) (← links)
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries (Q5445504) (← links)
- Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups (Q5502760) (← links)
- Scalable Multi-party Private Set-Intersection (Q5738787) (← links)
- VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets (Q5857774) (← links)
- Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries (Q5962221) (← links)
- Hiding the input-size in multi-party private set intersection (Q6048707) (← links)
- Quantum multi-party private set union protocol based on least common multiple and Shor’s algorithm (Q6086667) (← links)
- Practical and malicious private set intersection with improved efficiency (Q6122611) (← links)
- Width-based search for multi agent privacy-preserving planning (Q6161467) (← links)
- Linear-time 2-party secure merge from additively homomorphic encryption (Q6168324) (← links)
- Element distinctness and bounded input size in private set intersection and related protocols (Q6547968) (← links)
- Scalable multi-party private set union from multi-query secret-shared private membership test (Q6595683) (← links)
- Unconditionally secure multiparty computation for symmetric functions with low bottleneck complexity (Q6595687) (← links)
- Private computations on set intersection (Q6613361) (← links)
- Private set operations from multi-query reverse private membership test (Q6635832) (← links)