Back to Results
First PageMeta Content
Computational complexity theory / Secure multi-party computation / Commitment scheme / Homomorphic encryption / Secure two-party computation / Paillier cryptosystem / Oblivious transfer / Zero-knowledge proof / Communication complexity / Cryptography / Cryptographic protocols / Public-key cryptography


Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† November 25, 2010
Add to Reading List

Document Date: 2010-11-25 08:58:28


Open Document

File Size: 331,80 KB

Share Result on Facebook

Company

IDC / Microsoft / /

Currency

pence / /

/

Event

Bankruptcy / FDA Phase / /

Facility

Ben-Gurion University / Weizmann Institute / /

IndustryTerm

oblivious pseudorandom function evaluation protocol / public-coin protocol / sub-protocols / Σ-protocol / set-intersection protocol / recommendation systems / set-union protocols / polynomial-time algorithm / above protocol / sub-protocol computing / secure function evaluation protocol / basic protocol / potential applications / possible solution / secure protocol / constantround protocols / set intersection protocol / law enforcement / computing / oblivious pseudorandom evaluation protocol / trusted party computing / /

Organization

Pi / Israel Science Foundation / Weizmann Institute / Ben-Gurion University / P2 / Interdisciplinary Center / P1 / /

Person

Song / /

Position

universal knowledge extractor / external trusted dealer / player analogous / benign semi-honest model / and under standard cryptographic assumptions / Colonel / /

Product

P1 / Section / P2 / /

ProgrammingLanguage

R / K / /

Technology

intended protocol / two-party protocol / resulting protocols / above protocol / set-union protocols / prescribed protocol / secure two-party protocols / secure function evaluation protocol / probabilistic PPT algorithms / oblivious pseudorandom function evaluation protocol / real protocol / Knowledge Our protocols / Two protocols / prescribed protocols / secret key / PPT algorithms / oblivious pseudorandom evaluation protocol / set-intersection protocol / constantround protocols / public key encryption / resulting protocol / encryption / 2.3 Public-Key Encryption / PPT algorithm / public key / basic protocol / polynomial-time algorithm / 3-round public-coin protocol / simulation / specified protocol / secure protocol / set intersection protocol / /

SocialTag