Back to Results
First PageMeta Content
Applied mathematics / Quantum complexity theory / Computational complexity theory / Secure multi-party computation / Communication complexity / Secure two-party computation / PP / One-way function / IP / Cryptography / Theoretical computer science / Cryptographic protocols


Efficient Set Intersection with Simulation-Based Security Michael J. Freedman∗ Carmit Hazay† Kobbi Nissim‡
Add to Reading List

Document Date: 2014-09-04 05:09:56


Open Document

File Size: 529,37 KB

Share Result on Facebook

Currency

pence / /

/

Facility

Princeton University / Bar Ilan University / Bar-Ilan University / Ben-Gurion University / Building Blocks / /

IndustryTerm

oblivious pseudorandom function evaluation protocol / secure protocols / sub-protocols / probabilistic polynomial-time algorithms / semi-honest protocol / data mining / real-model protocol / secure party protocol / online recommendation services / above protocol / secure function evaluation protocol / basic protocol / potential applications / polynomial-time algorithms / circuit computing / set intersection protocols / trivial solution / constant-round protocols / set intersection protocol / online collaboration / computing / trusted party computing / /

Organization

Pi / Bar-Ilan University / Israel Ministry of Science and Technology / Israel Science Foundation / Ben-Gurion University / Faculty of Engineering / Princeton University / P1 / /

Person

Michael J. Freedman∗ Carmit Hazay / Reed Solomon / Y . They / Benny Pinkas / /

/

Technology

two-party protocol / resulting protocols / above protocol / prescribed protocol / secure two-party protocols / secure function evaluation protocol / oblivious pseudorandom function evaluation protocol / polynomial-time algorithms / real protocol / homomorphic encryption / probabilistic polynomial-time algorithms / secret key / PET protocol / 2.3 Public Key Encryption / public key encryption / encryption / secure party protocol / public key / real-model protocol / basic protocol / improved protocol / data mining / constant-round protocols / semi-honest protocol / Simulation / specified protocol / 2.1 Protocols / set intersection protocols / set intersection protocol / Computing Set Intersection These protocols / /

SocialTag