Secure Set Intersection with Untrusted Hardware Tokens
From MaRDI portal
Publication:3073691
DOI10.1007/978-3-642-19074-2_1zbMath1285.68009OpenAlexW2155920694MaRDI QIDQ3073691
Benny Pinkas, Thomas Schneider, Ivan Visconti, Ahmad-Reza Sadeghi, Marc Fischlin
Publication date: 11 February 2011
Published in: Topics in Cryptology – CT-RSA 2011 (Search for Journal in Brave)
Full work available at URL: https://encrypto.de/papers/FPSSV11.pdf
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Network protocols (68M12)
Related Items (2)
Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters ⋮ (Efficient) universally composable oblivious transfer using a minimal number of stateless tokens
Uses Software
Cites Work
- Unnamed Item
- Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
- (If) Size Matters: Size-Hiding Private Set Intersection
- Founding Cryptography on Tamper-Proof Hardware Tokens
- Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens
- Efficient Set Operations in the Presence of Malicious Adversaries
- Fast Secure Computation of Set Intersection
- Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
- One-Time Programs
- Bug Attacks
- Universally Composable Multiparty Computation with Partially Isolated Parties
- Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection
- Advances in Cryptology - EUROCRYPT 2004
- Universally Composable Multi-party Computation Using Tamper-Proof Hardware
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- Privacy-Preserving Set Operations
- David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
- New Constructions for UC Secure Computation Using Tamper-Proof Hardware
- Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
This page was built for publication: Secure Set Intersection with Untrusted Hardware Tokens