4.2 Article

Multiparty Threshold Private Set Intersection Protocol with Low Communication Complexity

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

Federated Machine Learning: Concept and Applications

Qiang Yang et al.

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2019)

Article Computer Science, Information Systems

Scalable Private Set Intersection Based on OT Extension

Benny Pinkas et al.

ACM TRANSACTIONS ON PRIVACY AND SECURITY (2018)

Proceedings Paper Computer Science, Theory & Methods

Efficient Scalable Multiparty Private Set-Intersection via Garbled Bloom Filters

Roi Inbar et al.

SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018 (2018)

Proceedings Paper Computer Science, Information Systems

Malicious-Secure Private Set Intersection via Dual Execution

Peter Rindal et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Article Computer Science, Theory & Methods

Efficient Set Intersection with Simulation-Based Security

Michael J. Freedman et al.

JOURNAL OF CRYPTOLOGY (2016)

Proceedings Paper Computer Science, Information Systems

Efficient Batched Oblivious PRF with Applications to Private Set Intersection

Vladimir Kolesnikov et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Article Computer Science, Theory & Methods

Efficient Set Operations in the Presence of Malicious Adversaries

Carmit Hazay et al.

JOURNAL OF CRYPTOLOGY (2012)