Sciweavers

6 search results - page 2 / 2
» Revisiting the Efficiency of Malicious Two-Party Computation
Sort
View
EUROCRYPT
2004
Springer
13 years 9 months ago
Efficient Private Matching and Set Intersection
We consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain. This problem has m...
Michael J. Freedman, Kobbi Nissim, Benny Pinkas