4.6 Article

A lightweight delegated private set intersection cardinality protocol

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage

Ningyu Chen et al.

Summary: The study presents a ciphertext-policy ABE scheme with shared decryption, allowing authorized users to recover messages independently while semi-authorized users can work together to access the messages, improving decryption efficiency.

IEEE TRANSACTIONS ON COMPUTERS (2022)

Article Computer Science, Hardware & Architecture

Secure Lightweight Key Exchange Using ECC for User-Gateway Paradigm

Chintan Patel et al.

Summary: This article proposes a highly secure and efficient Remote User Authentication (RUA) scheme for sensor-based environments using the User-Gateway model.

IEEE TRANSACTIONS ON COMPUTERS (2021)

Article Computer Science, Theory & Methods

SECURE AND EFFICIENT MULTIPARTY PRIVATE SET INTERSECTION CARDINALITY

Sumit Kumar Debnath et al.

Summary: In this paper, we propose a Multiparty Private Set Intersection Cardinality (MPSI-CA) method with linear complexity and flexibility. The scheme retains all security attributes and individual computational costs of each participant are independent of the number of participants.

ADVANCES IN MATHEMATICS OF COMMUNICATIONS (2021)

Article Computer Science, Hardware & Architecture

Efficient Delegated Private Set Intersection on Outsourced Private Datasets

Aydin Abadi et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Information Systems

Identity-Based Private Matching over Outsourced Encrypted Datasets

Shuo Qiu et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2018)

Article Computer Science, Information Systems

Scalable Private Set Intersection Based on OT Extension

Benny Pinkas et al.

ACM TRANSACTIONS ON PRIVACY AND SECURITY (2018)

Proceedings Paper Computer Science, Theory & Methods

Labeled PSI from Fully Homomorphic Encryption with Malicious Security

Hao Chen et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Article Computer Science, Information Systems

Blockchain challenges and opportunities: a survey

Zibin Zheng et al.

INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES (2018)

Proceedings Paper Computer Science, Information Systems

Efficient Batched Oblivious PRF with Applications to Private Set Intersection

Vladimir Kolesnikov et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Article Computer Science, Hardware & Architecture

Toward Efficient and Privacy-Preserving Computing in Big Data Era

Rongxing Lu et al.

IEEE NETWORK (2014)

Article Computer Science, Information Systems

EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity

Carlo Blundo et al.

JOURNAL OF COMPUTER SECURITY (2014)