An algebraic approach to maliciously secure private set intersection
From MaRDI portal
Publication:2292691
DOI10.1007/978-3-030-17659-4_6zbMath1498.94062OpenAlexW2794672641MaRDI QIDQ2292691
Publication date: 4 February 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-17659-4_6
Modes of computation (nondeterministic, parallel, interactive, probabilistic, etc.) (68Q10) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Privacy of data (68P27)
Related Items (14)
Oblivious key-value stores and amplification for private set intersection ⋮ Polynomial representation is tricky: maliciously secure private set intersection revisited ⋮ Two-Round Oblivious Linear Evaluation from Learning with Errors ⋮ Multi-party updatable delegated private set intersection ⋮ Hiding the input-size in multi-party private set intersection ⋮ Actively secure arithmetic computation and VOLE with constant computational overhead ⋮ Improved private set intersection for sets with small entries ⋮ Streaming and unbalanced PSI from function secret sharing ⋮ Malicious secure, structure-aware private set intersection ⋮ Finite interval-time transition system for real-time actors ⋮ Multiparty cardinality testing for threshold private intersection ⋮ Multi-party threshold private set intersection with sublinear communication ⋮ Private set intersection in the internet setting from lightweight oblivious PRF ⋮ PSI from PaXoS: fast, malicious private set intersection
This page was built for publication: An algebraic approach to maliciously secure private set intersection