We propose in this work to solve privacy preserving set relations performed by a third party in an outsourced configuration. We argue that solving the disjointness relation based on Bloom filters is a new contribution in particular by having another layer of privacy on the sets cardinality. We propose to compose the set relations in a slightly different way by applying a keyed hash function. Besides discussing the correctness of the set relations, we analyze how this impacts the privacy of the sets content as well as providing privacy on the sets cardinality. We are in particular interested in how having bits overlapping in the Bloom filters impacts the privacy level of our approach. Finally, we present our results with real-world parameter...
We study the problem of running a set membership test in private manner. We require that a client wa...
Abstract. This paper presents an efficient construction of a private disjointness testing protocol t...
In this paper we focus on protocols for private set intersection (PSI), through which two parties, e...
In the area of cloud computing, judging the fulfillment of service-level agreements on a technical l...
Abstract Private Set Intersection Cardinality that enable Multi-party to privately compute the cardi...
Abstract. Bloom filters provide a space- and time-efficient mean to check the inclusion of an elemen...
Abstract. In this paper, we propose a privacy-preserving variant of Bloom-filters. The Bloom-filter ...
In many important applications, a collection of mutually distrustful parties must perform private co...
Part 3: Privacy-Preserving Data Applications IInternational audienceBloom filters provide a space- a...
In many important applications, a collection of mutually distrustful parties must perform private co...
Bloom Filters are space and time efficient randomized data structures for representing (multi-)sets ...
We present two unconditional secure protocols for private set disjointness tests. In order to provid...
Private set intersection cardinality (PSI-CA) allows two parties, the sender and receiver, to comput...
Privacy-preserving techniques for processing sets of information have attracted the research communi...
Privacy-preserving techniques for processing sets of information have attracted the research communi...
We study the problem of running a set membership test in private manner. We require that a client wa...
Abstract. This paper presents an efficient construction of a private disjointness testing protocol t...
In this paper we focus on protocols for private set intersection (PSI), through which two parties, e...
In the area of cloud computing, judging the fulfillment of service-level agreements on a technical l...
Abstract Private Set Intersection Cardinality that enable Multi-party to privately compute the cardi...
Abstract. Bloom filters provide a space- and time-efficient mean to check the inclusion of an elemen...
Abstract. In this paper, we propose a privacy-preserving variant of Bloom-filters. The Bloom-filter ...
In many important applications, a collection of mutually distrustful parties must perform private co...
Part 3: Privacy-Preserving Data Applications IInternational audienceBloom filters provide a space- a...
In many important applications, a collection of mutually distrustful parties must perform private co...
Bloom Filters are space and time efficient randomized data structures for representing (multi-)sets ...
We present two unconditional secure protocols for private set disjointness tests. In order to provid...
Private set intersection cardinality (PSI-CA) allows two parties, the sender and receiver, to comput...
Privacy-preserving techniques for processing sets of information have attracted the research communi...
Privacy-preserving techniques for processing sets of information have attracted the research communi...
We study the problem of running a set membership test in private manner. We require that a client wa...
Abstract. This paper presents an efficient construction of a private disjointness testing protocol t...
In this paper we focus on protocols for private set intersection (PSI), through which two parties, e...