Decentralized Multi-Client Functional Encryption for Set Intersection with Improved Efficiency
暂无分享,去创建一个
[1] Mariana Raykova,et al. Scaling Private Set Intersection to Billion-Element Sets , 2014, Financial Cryptography.
[2] Kwangsu Lee,et al. Functional Encryption for Set Intersection in the Multi-Client Setting , 2020, IACR Cryptol. ePrint Arch..
[3] David Pointcheval,et al. Decentralized Multi-Client Functional Encryption for Inner Product , 2018, IACR Cryptol. ePrint Arch..
[4] Vladimir Kolesnikov,et al. Efficient Batched Oblivious PRF with Applications to Private Set Intersection , 2016, CCS.
[5] Yehuda Lindell,et al. Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries , 2008, Journal of Cryptology.
[6] Damien Stehlé,et al. Fully Secure Functional Encryption for Inner Products, from Standard Assumptions , 2016, CRYPTO.
[7] Angelo De Caro,et al. Simple Functional Encryption Schemes for Inner Products , 2015, IACR Cryptol. ePrint Arch..
[8] Yael Tauman Kalai,et al. Reusable garbled circuits and succinct functional encryption , 2013, STOC '13.
[9] Duong Hieu Phan,et al. Catalic: Delegated PSI Cardinality with Applications to Contact Tracing , 2020, IACR Cryptol. ePrint Arch..
[10] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[11] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[12] Dong Hoon Lee,et al. Two-Input Functional Encryption for Inner Products from Bilinear Maps , 2018, IACR Cryptol. ePrint Arch..
[13] Benny Pinkas,et al. Faster Private Set Intersection Based on OT Extension , 2014, USENIX Security Symposium.
[14] Victor Shoup,et al. Lower Bounds for Discrete Logarithms and Related Problems , 1997, EUROCRYPT.
[15] Andreas Peter,et al. Two-Client and Multi-client Functional Encryption for Set Intersection , 2019, ACISP.
[16] Kwangsu Lee. Efficient Multi-Client Functional Encryption for Conjunctive Equality and Range Queries , 2020, IACR Cryptol. ePrint Arch..
[17] Tad Hogg,et al. Enhancing privacy and trust in electronic communities , 1999, EC '99.
[18] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[19] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[20] Jonathan Katz,et al. Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? , 2012, NDSS.
[21] Dawn Song,et al. Epione: Lightweight Contact Tracing with Strong Privacy , 2020, IEEE Data Eng. Bull..
[22] Hoeteck Wee,et al. Multi-input Inner-Product Functional Encryption from Pairings , 2017, EUROCRYPT.
[23] Amit Sahai,et al. Multi-Input Functional Encryption , 2014, IACR Cryptol. ePrint Arch..
[24] Brent Waters,et al. Functional Encryption: Definitions and Challenges , 2011, TCC.
[25] Allison Bishop,et al. Function-Hiding Inner Product Encryption , 2015, ASIACRYPT.
[26] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[27] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[28] Vinod Vaikuntanathan,et al. Functional Encryption with Bounded Collusions via Multi-party Computation , 2012, CRYPTO.