Sciweavers

18 search results - page 2 / 4
» Private Intersection of Certified Sets
Sort
View
FC
2010
Springer
164views Cryptology» more  FC 2010»
13 years 5 months ago
Practical Private Set Intersection Protocols with Linear Complexity
Emiliano De Cristofaro, Gene Tsudik
AFRICACRYPT
2009
Springer
13 years 9 months ago
Certified Encryption Revisited
The notion of certified encryption had recently been suggested as a suitable setting for analyzing the security of encryption against adversaries that tamper with the key-registrat...
Pooya Farshim, Bogdan Warinschi
CRYPTO
2005
Springer
96views Cryptology» more  CRYPTO 2005»
13 years 11 months ago
Privacy-Preserving Set Operations
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private i...
Lea Kissner, Dawn Xiaodong Song
PDCAT
2007
Springer
13 years 11 months ago
Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors
When datasets are distributed on different sources, finding out their intersection while preserving the privacy of the datasets is a widely required task. In this paper, we addre...
Yingpeng Sang, Hong Shen
ACSC
2008
IEEE
13 years 12 months ago
Privacy preserving set intersection based on bilinear groups
We propose a more efficient privacy preserving set intersection protocol which improves the previously known result by a factor of O(N) in both the computation and communication c...
Yingpeng Sang, Hong Shen