Private Set Intersection for Unequal Set Sizes with Mobile Applications
暂无分享,去创建一个
Benny Pinkas | N. Asokan | Jian Liu | Thomas Schneider | Ágnes Kiss | N. Asokan | Benny Pinkas | Jian Liu | T. Schneider | Ágnes Kiss
[1] Xiaomin Liu,et al. Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection , 2009, TCC.
[2] Yehuda Lindell,et al. More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries , 2015, IACR Cryptol. ePrint Arch..
[3] Martin R. Albrecht,et al. Ciphers for MPC and FHE , 2015, IACR Cryptol. ePrint Arch..
[4] Catherine A. Meadows,et al. A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party , 1986, 1986 IEEE Symposium on Security and Privacy.
[5] Donald Beaver,et al. Precomputing Oblivious Transfer , 1995, CRYPTO.
[6] Tad Hogg,et al. Enhancing privacy and trust in electronic communities , 1999, EC '99.
[7] Emiliano De Cristofaro,et al. Experimenting with Fast Private Set Intersection , 2012, TRUST.
[8] Dragos Rotaru,et al. MPC-Friendly Symmetric Key Primitives , 2016, CCS.
[9] Martin R. Albrecht,et al. MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity , 2016, ASIACRYPT.
[10] Benny Pinkas,et al. The Circle Game: Scalable Private Membership Test Using Trusted Hardware , 2016, AsiaCCS.
[11] Florian Mendel,et al. Higher-Order Cryptanalysis of LowMC , 2015, ICISC.
[12] S. Srinivasa Rao,et al. An optimal Bloom filter replacement , 2005, SODA '05.
[13] Benny Pinkas,et al. Keyword Search and Oblivious Pseudorandom Functions , 2005, TCC.
[14] Michael Zohner,et al. Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens , 2014, USENIX Security Symposium.
[15] Thomas Schneider,et al. Faster secure two-party computation with less memory , 2013, ASIA CCS '13.
[16] Changyu Dong,et al. When private set intersection meets big data: an efficient and scalable protocol , 2013, CCS.
[17] Sara Ramezanian. A Study of Privacy Preserving Queries with Bloom Filters , 2016 .
[18] Emiliano De Cristofaro,et al. Countering GATTACA: efficient and secure testing of fully-sequenced human genomes , 2011, CCS '11.
[19] Michael Zohner,et al. ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation , 2015, NDSS.
[20] Yuval Ishai,et al. Distributed Point Functions and Their Applications , 2014, EUROCRYPT.
[21] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[22] David Evans,et al. Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates , 2015, EUROCRYPT.
[23] Yan Huang,et al. Privacy-Preserving Applications on Smartphones , 2011, HotSec.
[24] Dan Boneh,et al. Location Privacy via Private Proximity Testing , 2011, NDSS.
[25] Kartik Nayak,et al. ObliVM: A Programming Framework for Secure Computation , 2015, 2015 IEEE Symposium on Security and Privacy.
[26] Tommy Färnqvist. Number Theory Meets Cache Locality – Efficient Implementation of a Small Prime FFT for the GNU Multiple Precision Arithmetic Library , 2005 .
[27] Yehuda Lindell,et al. More efficient oblivious transfer and extensions for faster secure computation , 2013, CCS.
[28] Benny Pinkas,et al. Faster Private Set Intersection Based on OT Extension , 2014, USENIX Security Symposium.
[29] Peter Rindal,et al. Improved Private Set Intersection Against Malicious Adversaries , 2017, EUROCRYPT.
[30] Jonathan Katz,et al. Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? , 2012, NDSS.
[31] Benny Pinkas,et al. Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..
[32] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[33] Vladimir Kolesnikov,et al. Efficient Batched Oblivious PRF with Applications to Private Set Intersection , 2016, CCS.
[34] Marcel Keller,et al. Actively Secure OT Extension with Optimal Overhead , 2015, CRYPTO.
[35] Mihir Bellare,et al. Efficient Garbling from a Fixed-Key Blockcipher , 2013, 2013 IEEE Symposium on Security and Privacy.
[36] Yehuda Lindell,et al. Constructions of truly practical secure protocols using standardsmartcards , 2008, CCS.
[37] Benny Pinkas,et al. Secure Set Intersection with Untrusted Hardware Tokens , 2011, CT-RSA.
[38] Kasper Bonne Rasmussen,et al. Privacy-preserving User Matching , 2015, WPES@CCS.
[39] Yehuda Lindell,et al. Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries , 2008, Journal of Cryptology.
[40] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[41] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[42] Jian Liu,et al. Private Membership Test for Bloom Filters , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[43] Vladimir Kolesnikov,et al. Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.
[44] Willi Meier,et al. Optimized Interpolation Attacks on LowMC , 2015, ASIACRYPT.
[45] Stephen Hinde. Hot water, icebergs and other disasters , 1998, Comput. Secur..
[46] Radu Sion,et al. On the Practicality of Private Information Retrieval , 2007, NDSS.
[47] Goichiro Hanaoka,et al. Privacy-preserving search for chemical compound databases , 2015, BMC Bioinformatics.
[48] Patrick Traynor,et al. For your phone only: custom protocols for efficient secure function evaluation on mobile devices , 2014, Secur. Commun. Networks.
[49] Diego F. Aranha,et al. Unbalanced Approximate Private Set Intersection , 2017, IACR Cryptol. ePrint Arch..
[50] Prateek Mittal,et al. BotGrep: Finding P2P Bots with Structured Graph Analysis , 2010, USENIX Security Symposium.
[51] Jonathan Katz,et al. Secure two-party computation in sublinear (amortized) time , 2012, CCS.
[52] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[53] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[54] Li Fan,et al. Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.
[55] Yehuda Lindell,et al. Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries , 2008, TCC.
[56] Benny Pinkas,et al. Phasing: Private Set Intersection Using Permutation-based Hashing , 2015, USENIX Security Symposium.
[57] Ahmad-Reza Sadeghi,et al. CrowdShare: Secure Mobile Resource Sharing , 2013, ACNS.
[58] Joan Boyar,et al. A New Combinational Logic Minimization Technique with Applications to Cryptology , 2010, SEA.
[59] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[60] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[61] Emiliano De Cristofaro,et al. Practical Private Set Intersection Protocols with Linear Complexity , 2010, Financial Cryptography.
[62] Emiliano De Cristofaro,et al. Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications , 2013, ACSAC.
[63] Youki Kadobayashi,et al. Cryptographically Secure Bloom-Filters , 2009, Trans. Data Priv..
[64] Moni Naor,et al. Number-theoretic constructions of efficient pseudo-random functions , 2004, JACM.
[65] Benny Pinkas,et al. Scalable Private Set Intersection Based on OT Extension , 2018, IACR Cryptol. ePrint Arch..