Privacy-Preserving Set Operations
From MaRDI portal
Publication:5451029
DOI10.1007/11535218_15zbMath1145.94471OpenAlexW2143824669MaRDI QIDQ5451029
Publication date: 17 March 2008
Published in: Advances in Cryptology – CRYPTO 2005 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11535218_15
Related Items (53)
Efficient set intersection with simulation-based security ⋮ Oblivious key-value stores and amplification for private set intersection ⋮ Providing accurate models across private partitioned data: secure maximum likelihood estimation ⋮ Analysis of Gong et al.'s CCA2-secure homomorphic encryption ⋮ Implementing secure reporting of sexual misconduct -- revisiting WhoToo ⋮ Polynomial representation is tricky: maliciously secure private set intersection revisited ⋮ Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters ⋮ Privacy-preserving mixed set operations ⋮ Private set intersection: new generic constructions and feasibility results ⋮ Attribute-based fine-grained access control for outscored private set intersection computation ⋮ A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom Function ⋮ Multi-party updatable delegated private set intersection ⋮ Hiding the input-size in multi-party private set intersection ⋮ Improved private set intersection for sets with small entries ⋮ Threshold private set intersection with better communication complexity ⋮ Zero-Knowledge Accumulators and Set Algebra ⋮ Quantum multi-party private set union protocol based on least common multiple and Shor’s algorithm ⋮ Structure-aware private set intersection, with applications to fuzzy matching ⋮ Mixed-technique multi-party computations composed of two-party computations ⋮ Practical and malicious private set intersection with improved efficiency ⋮ Finding one common item, privately ⋮ Quantum secure multi-party private set intersection cardinality ⋮ Width-based search for multi agent privacy-preserving planning ⋮ Efficient Disjointness Tests for Private Datasets ⋮ Linear-time 2-party secure merge from additively homomorphic encryption ⋮ Zero-knowledge succinct non-interactive arguments of knowledge based on sets of polynomials ⋮ Malicious secure, structure-aware private set intersection ⋮ Efficient set operations in the presence of malicious adversaries ⋮ Confidential gossip ⋮ Laconic private set intersection and applications ⋮ Provably Secure Fair Mutual Private Set Intersection Cardinality Utilizing Bloom Filter ⋮ New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness ⋮ Privacy Preserving Data Mining within Anonymous Credential Systems ⋮ Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs ⋮ Scalable Multi-party Private Set-Intersection ⋮ Secure and efficient multiparty private set intersection cardinality ⋮ Private set-intersection with common set-up ⋮ Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries ⋮ Quantum private set intersection cardinality and its application to anonymous authentication ⋮ A communication-efficient private matching scheme in client-server model ⋮ Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries ⋮ PRUB: A privacy protection friend recommendation system based on user behavior ⋮ Privacy-Preserving Subgraph Matching Protocol for Two Parties ⋮ Secure Set Intersection with Untrusted Hardware Tokens ⋮ Server-aided private set intersection based on reputation ⋮ Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry ⋮ Fair Threshold Decryption with Semi-Trusted Third Parties ⋮ Multiparty cardinality testing for threshold private intersection ⋮ Multi-party threshold private set intersection with sublinear communication ⋮ Private set operations from oblivious switching ⋮ Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups ⋮ VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets ⋮ Two-sided malicious security for private intersection-sum with cardinality
This page was built for publication: Privacy-Preserving Set Operations