Scalable Private Set Union from Symmetric-Key Techniques
暂无分享,去创建一个
[1] Abhi Shelat,et al. Efficient Secure Computation with Garbled Circuits , 2011, ICISS.
[2] Vitaly Shmatikov,et al. Privacy-Preserving Graph Algorithms in the Semi-honest Model , 2005, ASIACRYPT.
[3] David Evans,et al. Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates , 2015, EUROCRYPT.
[4] Emiliano De Cristofaro,et al. Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model , 2010, ASIACRYPT.
[5] Dana Dachman-Soled,et al. Efficient Concurrent Covert Computation of String Equality and Set Intersection , 2016, CT-RSA.
[6] Changyu Dong,et al. When private set intersection meets big data: an efficient and scalable protocol , 2013, CCS.
[7] Jonathan Katz,et al. Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? , 2012, NDSS.
[8] Arkady Yerukhimovich,et al. Secure Multiparty Computation for Cooperative Cyber Risk Assessment , 2016, 2016 IEEE Cybersecurity Development (SecDev).
[9] Gaston H. Gonnet,et al. Expected Length of the Longest Probe Sequence in Hash Code Searching , 1981, JACM.
[10] Yehuda Lindell,et al. More efficient oblivious transfer and extensions for faster secure computation , 2013, CCS.
[11] Benny Pinkas,et al. Efficient Circuit-based PSI with Linear Communication , 2019, IACR Cryptol. ePrint Arch..
[12] Moti Yung,et al. On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications , 2019, IACR Cryptol. ePrint Arch..
[13] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[14] Rasmus Pagh,et al. Cuckoo Hashing , 2001, Encyclopedia of Algorithms.
[15] Russell Impagliazzo,et al. Limits on the provable consequences of one-way permutations , 1988, STOC '89.
[16] Xenofontas A. Dimitropoulos,et al. SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics , 2010, USENIX Security Symposium.
[17] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[18] Marina Blanton,et al. Private and oblivious set and multiset operations , 2012, AsiaCCS.
[19] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[20] Vladimir Kolesnikov,et al. Efficient Batched Oblivious PRF with Applications to Private Set Intersection , 2016, CCS.
[21] Peter Rindal,et al. Malicious-Secure Private Set Intersection via Dual Execution , 2017, CCS.
[22] Claudio Soriente,et al. Nothing Refreshes Like a RePSI: Reactive Private Set Intersection , 2018, IACR Cryptol. ePrint Arch..
[23] Emiliano De Cristofaro,et al. (If) Size Matters: Size-Hiding Private Set Intersection , 2011, IACR Cryptol. ePrint Arch..
[24] Carlos Cid,et al. An Efficient Toolkit for Computing Private Set Operations , 2017, ACISP.
[25] Carmit Hazay,et al. Scalable Multi-party Private Set-Intersection , 2017, Public Key Cryptography.
[26] Benny Pinkas,et al. Scalable Private Set Intersection Based on OT Extension , 2018, IACR Cryptol. ePrint Arch..
[27] Arjen K. Lenstra,et al. Information Security Risk Assessment, Aggregation, and Mitigation , 2004, ACISP.
[28] Rafail Ostrovsky,et al. Private Set Intersection with Linear Communication from General Assumptions , 2019, IACR Cryptol. ePrint Arch..
[29] Emiliano De Cristofaro,et al. Practical Private Set Intersection Protocols with Linear Complexity , 2010, Financial Cryptography.
[30] Claudio Orlandi,et al. Combining Private Set-Intersection with Secure Two-Party Computation , 2018, IACR Cryptol. ePrint Arch..
[31] Dawn Xiaodong Song,et al. Privacy-Preserving Set Operations , 2005, CRYPTO.
[32] Benny Pinkas,et al. Practical Multi-party Private Set Intersection from Symmetric-Key Techniques , 2017, CCS.
[33] Vladimir Kolesnikov,et al. Improved OT Extension for Transferring Short Secrets , 2013, CRYPTO.
[34] Hao Chen,et al. Fast Private Set Intersection from Homomorphic Encryption , 2017, CCS.
[35] Peter Winkler,et al. Comparing information without leaking it , 1996, CACM.
[36] Benny Pinkas,et al. Faster Private Set Intersection Based on OT Extension , 2014, USENIX Security Symposium.
[37] Keith B. Frikken. Privacy-Preserving Set Union , 2007, ACNS.
[38] Peter Rindal,et al. PIR-PSI: Scaling Private Contact Discovery , 2018, IACR Cryptol. ePrint Arch..
[39] Diego F. Aranha,et al. Faster Unbalanced Private Set Intersection , 2018, Financial Cryptography.
[40] Moni Naor,et al. Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation , 2009, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[41] Benny Pinkas,et al. SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension , 2019, IACR Cryptol. ePrint Arch..
[42] Benny Pinkas,et al. Phasing: Private Set Intersection Using Permutation-based Hashing , 2015, USENIX Security Symposium.
[43] Helger Lipmaa,et al. Verifiable Homomorphic Oblivious Transfer and Private Equality Test , 2003, ASIACRYPT.
[44] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[45] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[46] Omer Paneth,et al. Verifiable Set Operations over Outsourced Databases , 2014, IACR Cryptol. ePrint Arch..
[47] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[48] Donald Beaver,et al. Correlated pseudorandomness and the complexity of private computations , 1996, STOC '96.
[49] Peter Rindal,et al. Improved Private Set Intersection Against Malicious Adversaries , 2017, EUROCRYPT.
[50] Jacques Traoré,et al. A fair and efficient solution to the socialist millionaires' problem , 2001, Discret. Appl. Math..
[51] Benny Pinkas,et al. Keyword Search and Oblivious Pseudorandom Functions , 2005, TCC.
[52] Carmit Hazay,et al. Efficient Set Operations in the Presence of Malicious Adversaries , 2010, Journal of Cryptology.