Advances in Cryptology - EUROCRYPT 2004
From MaRDI portal
Publication:5307243
DOI10.1007/b97182zbMath1122.94416OpenAlexW2477185671WikidataQ21683979 ScholiaQ21683979MaRDI QIDQ5307243
Kobbi Nissim, Benny Pinkas, Michael J. Freedman
Publication date: 25 September 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b97182
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (81)
Efficient secure multiparty computation of sparse vector dot products ⋮ An efficient quantum scheme for private set intersection ⋮ Efficient set intersection with simulation-based security ⋮ Oblivious key-value stores and amplification for private set intersection ⋮ SE-PSI: fog/cloud server-aided enhanced secure and effective private set intersection on scalable datasets with Bloom Filter ⋮ Multiparty Proximity Testing with Dishonest Majority from Equality Testing ⋮ Polynomial representation is tricky: maliciously secure private set intersection revisited ⋮ Rate-limited secure function evaluation ⋮ Certifying equality with limited interaction ⋮ Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters ⋮ An efficient approach for secure multi-party computation without authenticated channel ⋮ Private set intersection: new generic constructions and feasibility results ⋮ Attribute-based fine-grained access control for outscored private set intersection computation ⋮ A survey of privacy-preserving mechanisms for heterogeneous data types ⋮ Multi-party updatable delegated private set intersection ⋮ Hiding the input-size in multi-party private set intersection ⋮ Privacy-preserving blueprints ⋮ Private polynomial commitments and applications to MPC ⋮ Threshold private set intersection with better communication complexity ⋮ Zero-Knowledge Accumulators and Set Algebra ⋮ Quantum multi-party private set union protocol based on least common multiple and Shor’s algorithm ⋮ Structure-aware private set intersection, with applications to fuzzy matching ⋮ Mixed-technique multi-party computations composed of two-party computations ⋮ Efficient private set intersection cardinality protocol in the reverse unbalanced setting ⋮ Practical and malicious private set intersection with improved efficiency ⋮ A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle ⋮ Feasible private set intersection in quantum domain ⋮ Finding one common item, privately ⋮ Streaming and unbalanced PSI from function secret sharing ⋮ A novel quantum private set intersection scheme with a semi-honest third party ⋮ Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack ⋮ Quantum secure multi-party summation based on entanglement swapping ⋮ Efficient Disjointness Tests for Private Datasets ⋮ Linear-time 2-party secure merge from additively homomorphic encryption ⋮ Malicious secure, structure-aware private set intersection ⋮ Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection ⋮ Quantum solution to a class of two-party private summation problems ⋮ Cryptanalysis and improvement of a quantum private set intersection protocol ⋮ Decentralized multi-client functional encryption for set intersection with improved efficiency ⋮ Efficient set operations in the presence of malicious adversaries ⋮ Privacy preserving distributed optimization using homomorphic encryption ⋮ New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness ⋮ Privacy Preserving Data Mining within Anonymous Credential Systems ⋮ A novel quantum protocol for private set intersection ⋮ Quantum protocols for private set intersection cardinality and union cardinality based on entanglement swapping ⋮ Comparing two sets without disclosing them ⋮ Benaloh’s Dense Probabilistic Encryption Revisited ⋮ Quantum secure two-party computation for set intersection with rational players ⋮ Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs ⋮ Oblivious access control policies for cloud based data sharing systems ⋮ Scalable Multi-party Private Set-Intersection ⋮ Improved Private Set Intersection Against Malicious Adversaries ⋮ Symmetric cryptographic protocols for extended millionaires' problem ⋮ Proving possession of arbitrary secrets while not giving them away: New protocols and a proof in GNY logic ⋮ Secure and efficient multiparty private set intersection cardinality ⋮ Private set-intersection with common set-up ⋮ Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries ⋮ Fast Private Norm Estimation and Heavy Hitters ⋮ Quantum private set intersection cardinality and its application to anonymous authentication ⋮ A communication-efficient private matching scheme in client-server model ⋮ Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries ⋮ PRUB: A privacy protection friend recommendation system based on user behavior ⋮ Privacy-Preserving Subgraph Matching Protocol for Two Parties ⋮ Secure Set Intersection with Untrusted Hardware Tokens ⋮ Server-aided private set intersection based on reputation ⋮ Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks ⋮ Communication-Efficient Private Protocols for Longest Common Subsequence ⋮ Private multiparty sampling and approximation of vector combinations ⋮ Very fast construction of bounded‐degree spanning graphs via the semi‐random graph process ⋮ Multiparty cardinality testing for threshold private intersection ⋮ Multi-party threshold private set intersection with sublinear communication ⋮ Private set operations from oblivious switching ⋮ Bounded Size-Hiding Private Set Intersection ⋮ Functional encryption for set intersection in the multi-client setting ⋮ VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets ⋮ PSI-stats: private set intersection protocols supporting secure statistical functions ⋮ Influence maximization in social networks with privacy protection ⋮ Two-sided malicious security for private intersection-sum with cardinality ⋮ Private set intersection in the internet setting from lightweight oblivious PRF ⋮ Augmented Oblivious Polynomial Evaluation Protocol and Its Applications ⋮ PSI from PaXoS: fast, malicious private set intersection
This page was built for publication: Advances in Cryptology - EUROCRYPT 2004