Back to Results
First PageMeta Content
Commitment scheme / Zero-knowledge proof / Oblivious transfer / Secure two-party computation / Proof of knowledge / Communication complexity / IP / Polynomial / Homomorphic encryption / Cryptography / Cryptographic protocols / Secure multi-party computation


Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† May 4, 2010
Add to Reading List

Document Date: 2010-05-04 07:57:36


Open Document

File Size: 301,43 KB

Share Result on Facebook

Company

IDC / Microsoft / /

Currency

pence / /

/

Event

Bankruptcy / FDA Phase / /

Facility

Ben-Gurion University / Weizmann Institute / /

IndustryTerm

oblivious pseudorandom function evaluation protocol / sub-protocols / set-intersection protocol / recommendation systems / set-union protocols / above protocol / sub-protocol computing / secure function evaluation protocol / basic protocol / potential applications / possible solution / secure protocol / constantround protocols / set intersection protocol / law enforcement / computing / oblivious pseudorandom evaluation protocol / trusted party computing / /

Organization

Pi / Israel Science Foundation / Weizmann Institute / Ben-Gurion University / P2 / Interdisciplinary Center / P1 / /

Person

Reed Solomon / Song / /

Position

external trusted dealer / player analogous / benign semi-honest model / and under standard cryptographic assumptions / Colonel / /

Product

P1 / Section / P2 / /

Technology

intended protocol / two-party protocol / resulting protocols / above protocol / set-union protocols / prescribed protocol / secure two-party protocols / DDH problem Protocol / secure function evaluation protocol / oblivious pseudorandom function evaluation protocol / real protocol / The protocol / Two protocols / prescribed protocols / secret key / Proof Type ZKPK ZKPK ZK Protocol / oblivious pseudorandom evaluation protocol / set-intersection protocol / constantround protocols / resulting protocol / encryption / protocol using encryptions / 5 set intersection protocol / public key / 8 2.4 Zero-knowledge Proofs Our protocols / basic protocol / simulation / specified protocol / secure protocol / El Gamal encryption / /

SocialTag