Back to Results
First PageMeta Content
Cryptographic protocols / Communication / Quantum complexity theory / Quantum information science / Communication complexity / Computational complexity theory / Communications protocol / Information theory / Alice and Bob / Theoretical computer science / Information / Data


3 Applied Cryptography 3-1 On the Construction of Fast Secure Set-Intersection Protocols NOJIMA Ryo In this paper, we consider a two-party secure set-intersection protocol. In this protocol, there are two parties, a serv
Add to Reading List

Document Date: 2013-11-21 20:23:02


Open Document

File Size: 108,91 KB

Share Result on Facebook

Company

Cambridge University Press / /

Facility

National Institute of Information / /

IndustryTerm

approximate protocol / set-intersection protocol / stream algorithm / approximation algorithm / non-secure protocol / few existing protocols / potential practical applications / Internet applications / potential applications / existent protocols / cryptographic protocols / non-secure set-intersection protocol / secure set-intersection protocols / secure set-intersection protocol / rapid protocol / cryptographic protocol / traceback technology / space-efficient algorithm / /

OperatingSystem

DoS / /

Organization

Cambridge University / National Institute of Information / /

Person

Eyal Kushilevitz / Michael J. Freedman / Kobbi Nissim / Andrew Chi-Chih Yao / Michael Mitzenmacher / Traceable Secure / Ramamohan Paturi / Bob / Alice / Taher ElGamal / Benny Pinkas / George Varghese / Kirill Levchenko / Noam Nissan / Pascal Paillier / /

Position

Researcher / author / /

ProvinceOrState

Quebec / Virginia / /

PublishedMedium

IEEE Transactions on Information Theory / /

Technology

second protocol / few existing protocols / modified protocol / two-party secure set-intersection protocol / cryptographic protocol / remaining two protocols / approximate protocol / secret key / non-secure set-intersection protocol / set-intersection protocol / encryption / Cryptography / rapid protocol / 4 Approximate protocol / public key / SSL technologies / three protocols / secure set-intersection protocol / approximation algorithm / non-secure protocol / traceback technology / Information Security Research Center Algorithm / secure set-intersection protocols / third protocol / last protocol / stream algorithm / 4.3 Protocol / /

URL

http /

SocialTag