Abstract: We introduce the technique of searchable encryption into the problem of secure two-party computation, and obtain novel approaches to accomplish Private Set Intersection (PSI). We present two protocols for PSI. The first one uses Baek’s Public Key Encryption with Multiple Keywords Search (MPEKS) as the basic tool, and the second one uses Gu’s Public Key Encryption with Keyword Search (PEKS) as the basic tool. Baek’s MPEKS supports multiple keywords search, but it requires expensive MapToPoint operations. Although the computation complexity of the MapToPoint operation can be reduced by new techniques, it indeed influences the efficiency. A natural method is to find a searchable encryption which requires no MapToPoint operations. So,...
We survey the notion of provably secure Searchable Encryption (SE) by giving a complete and comprehe...
Abstract. Asymmetric searchable encryption allows searches to be carried over cipher-texts, through ...
We propose a novel protocol for computing a circuit which implements the multi-party private set int...
Private Set Intersection (PSI) is a cryptographic primitive that allows two network connected partie...
Private Set Intersection (PSI) is a well-studied secure two-party computation problem in which a cli...
Private set intersection (PSI) is a secure multi-party computation technique that allows several par...
We present a new paradigm for multi-party private set intersection (PSI) that allows $n$ parties to ...
Protocols for Private Set Intersection (PSI) are important cryptographic primitives that perform joi...
Privacy-preserving techniques for processing sets of information have attracted the research communi...
1. Public Key Encryption with Keyword Search (PEKS) • The concept was introduced by Boneh et al. (2...
Multi-Party Private Set Intersection (MPSI) is an attractive topic in research since a practical MPS...
In this paper we focus on protocols for private set intersection (PSI), through which two parties, e...
Private set intersection reveals the intersection of two private sets, but many real-world applicati...
Privacy-preserving techniques for processing sets of information have attracted the research communi...
We survey the notion of provably secure Searchable Encryption (SE) by giving a complete and comprehe...
We survey the notion of provably secure Searchable Encryption (SE) by giving a complete and comprehe...
Abstract. Asymmetric searchable encryption allows searches to be carried over cipher-texts, through ...
We propose a novel protocol for computing a circuit which implements the multi-party private set int...
Private Set Intersection (PSI) is a cryptographic primitive that allows two network connected partie...
Private Set Intersection (PSI) is a well-studied secure two-party computation problem in which a cli...
Private set intersection (PSI) is a secure multi-party computation technique that allows several par...
We present a new paradigm for multi-party private set intersection (PSI) that allows $n$ parties to ...
Protocols for Private Set Intersection (PSI) are important cryptographic primitives that perform joi...
Privacy-preserving techniques for processing sets of information have attracted the research communi...
1. Public Key Encryption with Keyword Search (PEKS) • The concept was introduced by Boneh et al. (2...
Multi-Party Private Set Intersection (MPSI) is an attractive topic in research since a practical MPS...
In this paper we focus on protocols for private set intersection (PSI), through which two parties, e...
Private set intersection reveals the intersection of two private sets, but many real-world applicati...
Privacy-preserving techniques for processing sets of information have attracted the research communi...
We survey the notion of provably secure Searchable Encryption (SE) by giving a complete and comprehe...
We survey the notion of provably secure Searchable Encryption (SE) by giving a complete and comprehe...
Abstract. Asymmetric searchable encryption allows searches to be carried over cipher-texts, through ...
We propose a novel protocol for computing a circuit which implements the multi-party private set int...