Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Privacy-Preserving Set Operations - MaRDI portal

Privacy-Preserving Set Operations

From MaRDI portal
Publication:5451029

DOI10.1007/11535218_15zbMath1145.94471OpenAlexW2143824669MaRDI QIDQ5451029

Lea Kissner, Dawn Song

Publication date: 17 March 2008

Published in: Advances in Cryptology – CRYPTO 2005 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11535218_15




Related Items (53)

Efficient set intersection with simulation-based securityOblivious key-value stores and amplification for private set intersectionProviding accurate models across private partitioned data: secure maximum likelihood estimationAnalysis of Gong et al.'s CCA2-secure homomorphic encryptionImplementing secure reporting of sexual misconduct -- revisiting WhoTooPolynomial representation is tricky: maliciously secure private set intersection revisitedPrivately Computing Set-Union and Set-Intersection Cardinality via Bloom FiltersPrivacy-preserving mixed set operationsPrivate set intersection: new generic constructions and feasibility resultsAttribute-based fine-grained access control for outscored private set intersection computationA Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom FunctionMulti-party updatable delegated private set intersectionHiding the input-size in multi-party private set intersectionImproved private set intersection for sets with small entriesThreshold private set intersection with better communication complexityZero-Knowledge Accumulators and Set AlgebraQuantum multi-party private set union protocol based on least common multiple and Shor’s algorithmStructure-aware private set intersection, with applications to fuzzy matchingMixed-technique multi-party computations composed of two-party computationsPractical and malicious private set intersection with improved efficiencyFinding one common item, privatelyQuantum secure multi-party private set intersection cardinalityWidth-based search for multi agent privacy-preserving planningEfficient Disjointness Tests for Private DatasetsLinear-time 2-party secure merge from additively homomorphic encryptionZero-knowledge succinct non-interactive arguments of knowledge based on sets of polynomialsMalicious secure, structure-aware private set intersectionEfficient set operations in the presence of malicious adversariesConfidential gossipLaconic private set intersection and applicationsProvably Secure Fair Mutual Private Set Intersection Cardinality Utilizing Bloom FilterNew Realizations of Efficient and Secure Private Set Intersection Protocols Preserving FairnessPrivacy Preserving Data Mining within Anonymous Credential SystemsOblivious polynomial evaluation and secure set-intersection from algebraic PRFsScalable Multi-party Private Set-IntersectionSecure and efficient multiparty private set intersection cardinalityPrivate set-intersection with common set-upEfficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert AdversariesQuantum private set intersection cardinality and its application to anonymous authenticationA communication-efficient private matching scheme in client-server modelEfficient protocols for set intersection and pattern matching with security against malicious and covert adversariesPRUB: A privacy protection friend recommendation system based on user behaviorPrivacy-Preserving Subgraph Matching Protocol for Two PartiesSecure Set Intersection with Untrusted Hardware TokensServer-aided private set intersection based on reputationProvably Secure Threshold Paillier Encryption Based on Hyperplane GeometryFair Threshold Decryption with Semi-Trusted Third PartiesMultiparty cardinality testing for threshold private intersectionMulti-party threshold private set intersection with sublinear communicationPrivate set operations from oblivious switchingKeyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic GroupsVD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private DatasetsTwo-sided malicious security for private intersection-sum with cardinality




This page was built for publication: Privacy-Preserving Set Operations