Linear-time 2-party secure merge from additively homomorphic encryption
From MaRDI portal
Publication:6168324
DOI10.1016/j.jcss.2023.04.007OpenAlexW4376127844WikidataQ122397964 ScholiaQ122397964MaRDI QIDQ6168324
No author found.
Publication date: 10 July 2023
Published in: Journal of Computer and System Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jcss.2023.04.007
Cites Work
- Unnamed Item
- Unnamed Item
- Sorting in \(c \log n\) parallel steps
- Efficient circuit-based PSI via cuckoo hashing
- New protocols for secure equality test and comparison
- More is less: perfectly secure oblivious algorithms in the multi-server setting
- Combining private set intersection with secure two-party computation
- Efficient circuit-based PSI with linear communication
- SpOT-light: lightweight private set intersection from sparse OT extension
- Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE
- Private Database Access with HE-over-ORAM Architecture
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds
- Fast Secure Computation of Set Intersection
- Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Software protection and simulation on oblivious RAMs
- Distributed Oblivious RAM for Secure Two-Party Computation
- Practically Efficient Multi-party Sorting Protocols from Comparison Sort Algorithms
- How to Simulate It – A Tutorial on the Simulation Proof Technique
- Advances in Cryptology - EUROCRYPT 2004
- Privacy-Preserving Set Operations
- Theory of Cryptography
- Improved Private Set Intersection Against Malicious Adversaries
- Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
This page was built for publication: Linear-time 2-party secure merge from additively homomorphic encryption