Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries - MaRDI portal

Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries

From MaRDI portal
Publication:5445504

DOI10.1007/978-3-540-78524-8_10zbMath1162.94367OpenAlexW1544695791MaRDI QIDQ5445504

Carmit Hazay, Yehuda Lindell

Publication date: 5 March 2008

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-78524-8_10




Related Items (26)

An efficient quantum scheme for private set intersectionEfficient set intersection with simulation-based securityAn Efficient Protocol for Oblivious DFA Evaluation and ApplicationsAutomata evaluation and text search protocols with simulation-based securityRate-limited secure function evaluationSecure parameterized pattern matchingPrivate set intersection: new generic constructions and feasibility resultsMalicious secure, structure-aware private set intersectionDecentralized multi-client functional encryption for set intersection with improved efficiencyEfficient set operations in the presence of malicious adversariesOn the impossibility of structure-preserving deterministic primitivesNew Realizations of Efficient and Secure Private Set Intersection Protocols Preserving FairnessImplementing Two-Party Computation Efficiently with Security Against Malicious AdversariesA novel quantum protocol for private set intersectionQuantum secure two-party computation for set intersection with rational playersRate-Limited Secure Function Evaluation: Definitions and ConstructionsSecure and efficient multiparty private set intersection cardinalityPrivate set-intersection with common set-upA communication-efficient private matching scheme in client-server modelEfficient protocols for set intersection and pattern matching with security against malicious and covert adversariesPRUB: A privacy protection friend recommendation system based on user behaviorSecure Set Intersection with Untrusted Hardware TokensServer-aided private set intersection based on reputationComputationally secure pattern matching in the presence of malicious adversariesBounded Size-Hiding Private Set IntersectionTwo-sided malicious security for private intersection-sum with cardinality



Cites Work




This page was built for publication: Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries