Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
From MaRDI portal
Publication:3058658
DOI10.1007/978-3-642-17373-8_13zbMath1253.94044OpenAlexW1510216169MaRDI QIDQ3058658
Gene Tsudik, Emiliano De Cristofaro, Ji-Hye Kim
Publication date: 7 December 2010
Published in: Advances in Cryptology - ASIACRYPT 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-17373-8_13
Related Items (24)
The multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signatures ⋮ Rate-limited secure function evaluation ⋮ Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters ⋮ Private set intersection: new generic constructions and feasibility results ⋮ Attribute-based fine-grained access control for outscored private set intersection computation ⋮ A proof of the conjectured run time of the Hafner-McCurley class group algorithm ⋮ Private polynomial commitments and applications to MPC ⋮ Practical and malicious private set intersection with improved efficiency ⋮ Finding one common item, privately ⋮ Malicious secure, structure-aware private set intersection ⋮ New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness ⋮ Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs ⋮ Scalable Multi-party Private Set-Intersection ⋮ Improved Private Set Intersection Against Malicious Adversaries ⋮ Secure and efficient multiparty private set intersection cardinality ⋮ Private set-intersection with common set-up ⋮ Secure Set Intersection with Untrusted Hardware Tokens ⋮ VOLE-PSI: fast OPRF and circuit-PSI from vector-OLE ⋮ Multiparty cardinality testing for threshold private intersection ⋮ Multi-party threshold private set intersection with sublinear communication ⋮ Bounded Size-Hiding Private Set Intersection ⋮ VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets ⋮ Two-sided malicious security for private intersection-sum with cardinality ⋮ Private set intersection in the internet setting from lightweight oblivious PRF
This page was built for publication: Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model