Private set intersection in the internet setting from lightweight oblivious PRF
From MaRDI portal
Publication:2102052
DOI10.1007/978-3-030-56877-1_2zbMath1504.94118OpenAlexW3037145554MaRDI QIDQ2102052
Publication date: 7 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56877-1_2
Related Items
Oblivious key-value stores and amplification for private set intersection ⋮ SE-PSI: fog/cloud server-aided enhanced secure and effective private set intersection on scalable datasets with Bloom Filter ⋮ Polynomial representation is tricky: maliciously secure private set intersection revisited ⋮ Multi-party updatable delegated private set intersection ⋮ Hiding the input-size in multi-party private set intersection ⋮ Privacy-preserving blueprints ⋮ Private polynomial commitments and applications to MPC ⋮ Improved private set intersection for sets with small entries ⋮ Structure-aware private set intersection, with applications to fuzzy matching ⋮ Adaptively code-correlation robustness functions and its applications to private set intersection ⋮ Finding one common item, privately ⋮ Malicious secure, structure-aware private set intersection ⋮ Amortizing rate-1 OT and applications to PIR and PSI ⋮ VOLE-PSI: fast OPRF and circuit-PSI from vector-OLE ⋮ Multi-party threshold private set intersection with sublinear communication ⋮ Private set operations from oblivious switching ⋮ PSI-stats: private set intersection protocols supporting secure statistical functions
Cites Work
- Efficient circuit-based PSI via cuckoo hashing
- PSI from PaXoS: fast, malicious private set intersection
- An algebraic approach to maliciously secure private set intersection
- SpOT-light: lightweight private set intersection from sparse OT extension
- Oblivious transfer and polynomial evaluation
- Improved OT Extension for Transferring Short Secrets
- Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
- (If) Size Matters: Size-Hiding Private Set Intersection
- Cuckoo hashing
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - CRYPTO 2003
- Theory of Cryptography
- Improved Private Set Intersection Against Malicious Adversaries
- The security of the cipher block chaining message authentication code
This page was built for publication: Private set intersection in the internet setting from lightweight oblivious PRF