Combining Private Set-Intersection with Secure Two-Party Computation

作者: Michele Ciampi , Claudio Orlandi

DOI: 10.1007/978-3-319-98113-0_25

关键词:

摘要: … Private Set-Intersection (PSI) is one of the most practically … sets of strings X and Y, respectively. At the end of the protocol one (or both) party should learn the intersection of the two sets \(…

参考文章(44)
Moni Naor, Niv Gilboa, Benny Chor, Private Information Retrieval by Keywords CTIT technical reports series. ,(1997)
Payman Mohassel, Salman Niksefat, Oblivious Decision Programs from Oblivious Transfer: Efficient Reductions financial cryptography. pp. 269- 284 ,(2012) , 10.1007/978-3-642-32946-3_20
Jonathan Katz, David Evans, Yan Huang, Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? network and distributed system security symposium. ,(2012)
Silvio Micali, Phillip Rogaway, Donald Beaver, The Round Complexity of Secure Protocols (Extended Abstract) symposium on the theory of computing. pp. 503- 513 ,(1990)
Yuval Ishai, Joe Kilian, Kobbi Nissim, Erez Petrank, Extending Oblivious Transfers Efficiently Advances in Cryptology - CRYPTO 2003. pp. 145- 161 ,(2003) , 10.1007/978-3-540-45146-4_9
Emiliano De Cristofaro, Gene Tsudik, Practical private set intersection protocols with linear complexity financial cryptography. ,vol. 6052, pp. 143- 159 ,(2010) , 10.1007/978-3-642-14577-3_13
Yuval Ishai, Anat Paskin, Evaluating Branching Programs on Encrypted Data Theory of Cryptography. pp. 575- 594 ,(2007) , 10.1007/978-3-540-70936-7_31
Stanisław Jarecki, Xiaomin Liu, Fast Secure Computation of Set Intersection Lecture Notes in Computer Science. pp. 418- 435 ,(2010) , 10.1007/978-3-642-15317-4_26
Chi-Yao Hong, Prateek Mittal, Matthew Caesar, Nikita Borisov, Shishir Nagaraja, BotGrep: finding P2P bots with structured graph analysis usenix security symposium. pp. 7- 7 ,(2010)