메뉴 건너뛰기




Volumn 5536 LNCS, Issue , 2009, Pages 125-142

Efficient robust private set intersection

Author keywords

Cryptographic Protocols; Privacy Preserving Data Mining; Secure Two party Computation; Set Intersection

Indexed keywords

BASIC PROCEDURE; CRYPTOGRAPHIC PROTOCOLS; OPEN PROBLEMS; PRIVACY PRESERVING DATA MINING; PRIVATE DATA; PROTOCOL EFFICIENCY; SECURE TWO-PARTY COMPUTATION; SET INTERSECTION;

EID: 68949136946     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-01957-9_8     Document Type: Conference Paper
Times cited : (130)

References (25)
  • 2
    • 84968518238 scopus 로고
    • Factoring polynomials over large finite fields
    • Berlekamp, E.: Factoring polynomials over large finite fields. Mathematics of Computation 24, 713-735 (1970)
    • (1970) Mathematics of Computation , vol.24 , pp. 713-735
    • Berlekamp, E.1
  • 3
    • 0035879575 scopus 로고    scopus 로고
    • A fair and efficient solution to the socialist millionaires problem
    • Boudot, F., Schoenmakers, B., Traoré, J.: A fair and efficient solution to the socialist millionaires problem. Discrete Applied Mathematics 111, 2001 (2001)
    • (2001) Discrete Applied Mathematics , vol.111 , pp. 2001
    • Boudot, F.1    Schoenmakers, B.2    Traoré, J.3
  • 5
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13, 2000 (2000)
    • (2000) Journal of Cryptology , vol.13 , pp. 2000
    • Canetti, R.1
  • 6
    • 40249113229 scopus 로고    scopus 로고
    • Choi, S., Dachman-Soled, D., Malkin, T., Wee, H.: Black-box construction of a non-malleable encryption scheme from any semantically secure one. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 427-444. Springer, Heidelberg (2008)
    • Choi, S., Dachman-Soled, D., Malkin, T., Wee, H.: Black-box construction of a non-malleable encryption scheme from any semantically secure one. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 427-444. Springer, Heidelberg (2008)
  • 7
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
    • El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10-18. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 10-18
    • El Gamal, T.1
  • 9
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 10
    • 33646562165 scopus 로고    scopus 로고
    • Foundations of cryptography: A primer. Found
    • Goldreich, O.: Foundations of cryptography: a primer. Found. Trends Theor. Comput. Sci. 1(1), 1-116 (2005)
    • (2005) Trends Theor. Comput. Sci , vol.1 , Issue.1 , pp. 1-116
    • Goldreich, O.1
  • 11
    • 85050160774 scopus 로고    scopus 로고
    • Shafi, G., Silvio, M.: Probabilistic encryption & how to play mental poker keeping secret all partial information. In: STOC 1982: Proceedings of the fourteenth annual ACM symposium on Theory of computing, pp. 365-377. ACM, New York (1982)
    • Shafi, G., Silvio, M.: Probabilistic encryption & how to play mental poker keeping secret all partial information. In: STOC 1982: Proceedings of the fourteenth annual ACM symposium on Theory of computing, pp. 365-377. ACM, New York (1982)
  • 12
    • 40249108370 scopus 로고    scopus 로고
    • Hazay, C., Lindell, Y.: Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 155-175. Springer, Heidelberg (2008)
    • Hazay, C., Lindell, Y.: Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008)
  • 13
    • 85028775577 scopus 로고
    • Direct minimum knowledge computations
    • Pomerance, C, ed, CRYPTO 1987, Springer, Heidelberg
    • Impagliazzo, R., Yung, M.: Direct minimum knowledge computations. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 40-51. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 40-51
    • Impagliazzo, R.1    Yung, M.2
  • 14
    • 84955606093 scopus 로고    scopus 로고
    • Proving without knowing: On oblivious, agnostic and blindfolded provers
    • Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
    • Jakobsson, M., Yung, M.: Proving without knowing: On oblivious, agnostic and blindfolded provers. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 186-200. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 186-200
    • Jakobsson, M.1    Yung, M.2
  • 15
    • 70350656283 scopus 로고    scopus 로고
    • Jarecki, S., Liu, X.: Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection. In: TCC, pp. 577-594 (2009)
    • Jarecki, S., Liu, X.: Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection. In: TCC, pp. 577-594 (2009)
  • 17
    • 26444553355 scopus 로고    scopus 로고
    • Kiayias, A., Mitrofanova, A.: Testing disjointness of private datasets. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, 3570, pp. 109-124. Springer, Heidelberg (2005)
    • Kiayias, A., Mitrofanova, A.: Testing disjointness of private datasets. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 109-124. Springer, Heidelberg (2005)
  • 18
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Kissner, L., Song, D.X.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 241-257
    • Kissner, L.1    Song, D.X.2
  • 20
    • 38049136534 scopus 로고    scopus 로고
    • An efficient protocol for secure two-party computation in the presence of malicious adversaries
    • Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
    • Lindell, Y., Pinkas, B.: An efficient protocol for secure two-party computation in the presence of malicious adversaries. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 52-78. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 52-78
    • Lindell, Y.1    Pinkas, B.2
  • 22
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 23
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A.: How to share a secret. Commun. ACM 22(11), 612-613 (1979)
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 24
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • Yao, A.C.-C.: Protocols for secure computations. In: FOCS, pp. 160-164 (1982)
    • (1982) FOCS , pp. 160-164
    • Yao, A.C.-C.1
  • 25
    • 0022882770 scopus 로고
    • How to generate and exchange secrets (extended abstract)
    • Yao, A.C.-C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162-167 (1986)
    • (1986) FOCS , pp. 162-167
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.