Back to Results
First PageMeta Content
Secure two-party computation / Pseudorandomness / Random oracle / Security parameter / Zero-knowledge proof / IP / Universal composability / Verifiable secret sharing / Cryptography / Cryptographic protocols / Secure multi-party computation


Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†
Add to Reading List

Document Date: 2014-09-16 05:37:56


Open Document

File Size: 370,41 KB

Share Result on Facebook

Country

Israel / /

Currency

pence / USD / /

/

Facility

Bar-Ilan University / /

IndustryTerm

law-abiding citizens / secure protocols / basic tools / oblivious transfer protocol / probabilistic polynomialtime algorithm / privacy-preserving data mining / distributed data mining / secure protocol / set intersection protocols / health insurance / trusted party computing f1 / data mining / simulatable protocol / real-model protocol / secure party protocol / computing / larger protocol / secure multiparty protocol / /

Organization

Pi / Bar-Ilan University / Israel Ministry of Science and Technology / P2 / Pj / P1 / /

Technology

oblivious transfer protocol / secure party protocol / two-party protocol / larger protocol / real-model protocol / real protocol / secure multiparty protocol / The protocol / data mining / probabilistic polynomialtime algorithm / two protocols / simulation / specified protocol / set intersection protocols / secure protocol / /

SocialTag