Advances in Cryptology - EUROCRYPT 2004

From MaRDI portal
Publication:5307243

DOI10.1007/b97182zbMath1122.94416OpenAlexW2477185671WikidataQ21683979 ScholiaQ21683979MaRDI QIDQ5307243

Kobbi Nissim, Benny Pinkas, Michael J. Freedman

Publication date: 25 September 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b97182




Related Items (81)

Efficient secure multiparty computation of sparse vector dot productsAn efficient quantum scheme for private set intersectionEfficient set intersection with simulation-based securityOblivious key-value stores and amplification for private set intersectionSE-PSI: fog/cloud server-aided enhanced secure and effective private set intersection on scalable datasets with Bloom FilterMultiparty Proximity Testing with Dishonest Majority from Equality TestingPolynomial representation is tricky: maliciously secure private set intersection revisitedRate-limited secure function evaluationCertifying equality with limited interactionPrivately Computing Set-Union and Set-Intersection Cardinality via Bloom FiltersAn efficient approach for secure multi-party computation without authenticated channelPrivate set intersection: new generic constructions and feasibility resultsAttribute-based fine-grained access control for outscored private set intersection computationA survey of privacy-preserving mechanisms for heterogeneous data typesMulti-party updatable delegated private set intersectionHiding the input-size in multi-party private set intersectionPrivacy-preserving blueprintsPrivate polynomial commitments and applications to MPCThreshold private set intersection with better communication complexityZero-Knowledge Accumulators and Set AlgebraQuantum multi-party private set union protocol based on least common multiple and Shor’s algorithmStructure-aware private set intersection, with applications to fuzzy matchingMixed-technique multi-party computations composed of two-party computationsEfficient private set intersection cardinality protocol in the reverse unbalanced settingPractical and malicious private set intersection with improved efficiencyA homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracleFeasible private set intersection in quantum domainFinding one common item, privatelyStreaming and unbalanced PSI from function secret sharingA novel quantum private set intersection scheme with a semi-honest third partyPrivacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attackQuantum secure multi-party summation based on entanglement swappingEfficient Disjointness Tests for Private DatasetsLinear-time 2-party secure merge from additively homomorphic encryptionMalicious secure, structure-aware private set intersectionCryptanalysis of a privacy-preserving authentication scheme based on private set intersectionQuantum solution to a class of two-party private summation problemsCryptanalysis and improvement of a quantum private set intersection protocolDecentralized multi-client functional encryption for set intersection with improved efficiencyEfficient set operations in the presence of malicious adversariesPrivacy preserving distributed optimization using homomorphic encryptionNew Realizations of Efficient and Secure Private Set Intersection Protocols Preserving FairnessPrivacy Preserving Data Mining within Anonymous Credential SystemsA novel quantum protocol for private set intersectionQuantum protocols for private set intersection cardinality and union cardinality based on entanglement swappingComparing two sets without disclosing themBenaloh’s Dense Probabilistic Encryption RevisitedQuantum secure two-party computation for set intersection with rational playersOblivious polynomial evaluation and secure set-intersection from algebraic PRFsOblivious access control policies for cloud based data sharing systemsScalable Multi-party Private Set-IntersectionImproved Private Set Intersection Against Malicious AdversariesSymmetric cryptographic protocols for extended millionaires' problemProving possession of arbitrary secrets while not giving them away: New protocols and a proof in GNY logicSecure and efficient multiparty private set intersection cardinalityPrivate set-intersection with common set-upEfficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert AdversariesFast Private Norm Estimation and Heavy HittersQuantum private set intersection cardinality and its application to anonymous authenticationA communication-efficient private matching scheme in client-server modelEfficient protocols for set intersection and pattern matching with security against malicious and covert adversariesPRUB: A privacy protection friend recommendation system based on user behaviorPrivacy-Preserving Subgraph Matching Protocol for Two PartiesSecure Set Intersection with Untrusted Hardware TokensServer-aided private set intersection based on reputationPrivacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing AttacksCommunication-Efficient Private Protocols for Longest Common SubsequencePrivate multiparty sampling and approximation of vector combinationsVery fast construction of bounded‐degree spanning graphs via the semi‐random graph processMultiparty cardinality testing for threshold private intersectionMulti-party threshold private set intersection with sublinear communicationPrivate set operations from oblivious switchingBounded Size-Hiding Private Set IntersectionFunctional encryption for set intersection in the multi-client settingVD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private DatasetsPSI-stats: private set intersection protocols supporting secure statistical functionsInfluence maximization in social networks with privacy protectionTwo-sided malicious security for private intersection-sum with cardinalityPrivate set intersection in the internet setting from lightweight oblivious PRFAugmented Oblivious Polynomial Evaluation Protocol and Its ApplicationsPSI from PaXoS: fast, malicious private set intersection




This page was built for publication: Advances in Cryptology - EUROCRYPT 2004