• No results found

private set intersection

O-PSI : delegated private set intersection on outsourced datasets

O-PSI : delegated private set intersection on outsourced datasets

... Abstract. Private set intersection (PSI) has a wide range of applications such as privacy-preserving data ...delegated private set intersection on outsourced datasets based on a ...

14

On  the  performance  of  certain  Private  Set  Intersection  protocols

On the performance of certain Private Set Intersection protocols

... De Cristofaro, et al. [DKT10] present another linear-complexity short-exponent PSI construction secure in ROM in the presence of malicious adversaries. However, compared to [JL10], its security relies on a weaker ...

20

Two-party  Private  Set  Intersection  with  an  Untrusted  Third  Party

Two-party Private Set Intersection with an Untrusted Third Party

... to private set intersection and private set union, in the three-party ...viewing intersection cardinality as a particular f in the f (P SI ) problem, we see these results as ...

31

VD-PSI : verifiable delegated private set intersection on outsourced private datasets

VD-PSI : verifiable delegated private set intersection on outsourced private datasets

... Abstract. Private set intersection (PSI) protocols have many real world applica- ...on private datasets that does not leak any information about the data is very challenging, especially when ...

17

Nothing  Refreshes  Like  a  RePSI:  Reactive  Private  Set  Intersection

Nothing Refreshes Like a RePSI: Reactive Private Set Intersection

... of Private Set Intersection (PSI) protocols have been pro- posed in recent years, their adoption in real-life applications is still hindered by a few ...server’s private set by ...

23

Fair private set intersection with a semi-trusted arbiter

Fair private set intersection with a semi-trusted arbiter

... two-party private set intersection protocol, we can achieve fairness, correctness and ...correct intersection with regard to the actual input to the protocol, and know nothing more than ...

16

Faster  Private  Set  Intersection  based  on  OT  Extension

Faster Private Set Intersection based on OT Extension

... Several private set intersection protocols are based on running many invocations of pairwise private equality tests ...our set inclusion protocol in ...a set of bins. If an input ...

21

When private set intersection meets big data : an efficient and scalable protocol

When private set intersection meets big data : an efficient and scalable protocol

... The concept and first protocol of Private Set Intersection were introduced by Freedman et al in [22]. Their protocol is based on oblivious polynomial evaluation. Along this line, Kiss- ner and Song ...

29

An Innovative Group Matching Mechanism Based on Private Set Intersection and Ring Signatures Without Disclosing Any Sensitive Data 
Mohd  Abdul Wase Sabahat & Mr  Nagendra Kumar

An Innovative Group Matching Mechanism Based on Private Set Intersection and Ring Signatures Without Disclosing Any Sensitive Data Mohd Abdul Wase Sabahat & Mr Nagendra Kumar

... Groups, which may allow for open or closed access, in- vitation and/or joining by other users outside the group, are formed to provide mini-networks within the larger, more diverse social network service. In this paper, ...

5

Private  Set  Intersection  with  Linear  Communication  from  General  Assumptions

Private Set Intersection with Linear Communication from General Assumptions

... of private set intersection (PSI), and early works focused on building custom protocols to perform PSI (some examples include [FNP04, KS05, HL10, JL09, JL10, DSMRY09, DCT10, ...The private ...

40

Phasing:  Private  Set  Intersection  using  Permutation-based  Hashing

Phasing: Private Set Intersection using Permutation-based Hashing

... PSI protocols based on generic secure computation have higher run-time and communication complexity than most special-purpose PSI protocols [CT12, PSZ14]. Yet, these protocols are of great importance since they enable to ...

21

Efficient  Delegated  Private  Set  Intersection  on  Outsourced  Private  Datasets

Efficient Delegated Private Set Intersection on Outsourced Private Datasets

... the intersection. Intersection cardinality is a widely used feature in data mining and could enable the server to infer a lot of things without knowing the content of the ...the intersection between ...

15

Combining  Private  Set-Intersection  with  Secure  Two-Party  Computation

Combining Private Set-Intersection with Secure Two-Party Computation

... one set is much smaller than the other (like in the case of PSM), but in this case the output will necessarily leak to the receiver, which prevents composition with further 2PC ...

30

An  Algebraic  Approach  to  Maliciously  Secure  Private  Set  Intersection

An Algebraic Approach to Maliciously Secure Private Set Intersection

... the intersection, and as long as we observe the additional inputs at some point, we can correctly reduce the inter- section in the ideal setting before outputting ...intermediate intersection corresponds to ...

39

Are  you  The  One  to  Share?  Secret  Transfer  with  Access  Structure

Are you The One to Share? Secret Transfer with Access Structure

... construct private set-intersection with access structure, which is the first of the kind to the best of our ...of intersection, leaving an interesting open question to fill up ...

24

A Survey on Online Friend Matching Protocol

A Survey on Online Friend Matching Protocol

... into Private Set Intersection or Private Set Intersection ...profile private during match its interests with another’s pro-file is ...

5

Invertible  Polynomial  Representation  for  Private  Set  Operations

Invertible Polynomial Representation for Private Set Operations

... most private set intersection protocols based on polynomial representations and AHE schemes, it is hard to factor the resulting polynomial corresponded to the intersection of ...the set ...

24

Strong convergence theorems for equilibrium problems and fixed point problems: A new iterative method, some comments and applications

Strong convergence theorems for equilibrium problems and fixed point problems: A new iterative method, some comments and applications

... Let EP(f) denote the set of all solutions of the problem (1.1). Since several problems in physics, optimization, and economics reduce to find a solution of (1.1) (see, e.g., [1,2]), some authors had proposed some ...

15

The Turtleback Diagram for Conditional Probability

The Turtleback Diagram for Conditional Probability

... The Venn diagram is known as the standard graphical tool for set theory. Both Venn diagram and the turtleback diagram use regions to represent sets. However, there is a major difference. In a turtleback diagram, ...

22

A note on the relationship between the isotone assumption of the Abian Brown fixed point theorem and Abian’s most basic fixed point theorem

A note on the relationship between the isotone assumption of the Abian Brown fixed point theorem and Abian’s most basic fixed point theorem

... We have shown in Theorem  that Abian’s theorem relates to the idea of cycles and in Lemma  we have demonstrated that for finite maps acyclicity is implied by the isotone assumption as long each element relates to its ...

7

Show all 10000 documents...

Related subjects