Back to Results
First PageMeta Content
Information / Security token / Universal composability / Communications protocol / Secure two-party computation / Public-key cryptography / Access token / Cryptography / Cryptographic protocols / Data


HL08_set_intersection.graffle
Add to Reading List

Document Date: 2014-06-13 11:49:34


Open Document

File Size: 293,71 KB

Share Result on Facebook

City

Ramat Gan / /

Company

AES / M. In / /

Country

Germany / Italy / Israel / /

/

Event

FDA Phase / /

Facility

Bar Ilan University / University Bochum / Darmstadt University of Technology / University of Salerno / /

IndustryTerm

hardware manufacturer / malicious hardware / oblivious transfer protocols / basic protocol / cryptographic protocols / The underlying protocols / oblivious transfer protocol / secure function evaluation protocols / efficient protocols / software-based solutions / proposed several solutions / Secure set intersection protocols / privacy-preserving applications / online phase / token-based set intersection protocols / set intersection protocol / real-world protocol / overall online communication complexity / manufacturing process / /

Organization

Bar Ilan University / Darmstadt University of Technology / B. At / University of Salerno / /

Person

B. As / Fk / /

Position

test value rT / rT / malicious player / player / realworld honest player / /

Product

Ti / Privacy / Fig / /

Technology

token-based protocols / oblivious transfer protocol / Intel PentiumTM processor / artificial intelligence / efficient protocols / trusted third party.2 Set Intersection Protocol / basic protocol / token-based set intersection protocols / The underlying protocols / secret key / simulation / underlying protocol / set intersection protocol / verifiable encryption / Secure set intersection protocols / oblivious transfer protocols / two-party secure function evaluation protocols / Input The protocol / /

SocialTag