Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model

From MaRDI portal
Publication:3058658

DOI10.1007/978-3-642-17373-8_13zbMath1253.94044OpenAlexW1510216169MaRDI QIDQ3058658

Gene Tsudik, Emiliano De Cristofaro, Ji-Hye Kim

Publication date: 7 December 2010

Published in: Advances in Cryptology - ASIACRYPT 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-17373-8_13




Related Items (24)

The multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signaturesRate-limited secure function evaluationPrivately Computing Set-Union and Set-Intersection Cardinality via Bloom FiltersPrivate set intersection: new generic constructions and feasibility resultsAttribute-based fine-grained access control for outscored private set intersection computationA proof of the conjectured run time of the Hafner-McCurley class group algorithmPrivate polynomial commitments and applications to MPCPractical and malicious private set intersection with improved efficiencyFinding one common item, privatelyMalicious secure, structure-aware private set intersectionNew Realizations of Efficient and Secure Private Set Intersection Protocols Preserving FairnessOblivious polynomial evaluation and secure set-intersection from algebraic PRFsScalable Multi-party Private Set-IntersectionImproved Private Set Intersection Against Malicious AdversariesSecure and efficient multiparty private set intersection cardinalityPrivate set-intersection with common set-upSecure Set Intersection with Untrusted Hardware TokensVOLE-PSI: fast OPRF and circuit-PSI from vector-OLEMultiparty cardinality testing for threshold private intersectionMulti-party threshold private set intersection with sublinear communicationBounded Size-Hiding Private Set IntersectionVD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private DatasetsTwo-sided malicious security for private intersection-sum with cardinalityPrivate set intersection in the internet setting from lightweight oblivious PRF






This page was built for publication: Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model