We present efficient protocols for private set disjointness tests. We start from an intuition of our protocols that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the cardinality of the intersection. More specifically, it discloses its lower bound. By using the Lagrange interpolation we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. The protocol applies a verification test to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and c...
Private set intersection(PSI) is a two party protocol where both parties possess a private set and a...
In this work we demonstrate that allowing differentially private leakage can significantly improve t...
© 2017 Kim Sasha RamchenA fundamental problem in large distributed systems is how to enable parties ...
We present two unconditional secure protocols for private set disjointness tests. In order to provid...
Abstract. This paper presents an efficient construction of a private disjointness testing protocol t...
Two parties, say Alice and Bob, possess two sets of elements that belong to a universe of possible ...
When datasets are distributed on different sources, find-ing out their intersection while preserving...
We consider the problem of computing the intersection of private datasets of two parties, where the ...
In many distributed data mining settings, disclosure of theoriginal data sets is not acceptable due ...
Private set intersection is an important area of research and has been the focus of many works over ...
When datasets are distributed on different sources, finding out matched data while preserving the pr...
Large scale data processing brings new challenges to the design of privacy-preserving protocols: how...
Abstract: "In this paper we consider the problem of privately computing the intersection of sets (se...
We present a new paradigm for multi-party private set intersection (PSI) that allows $n$ parties to ...
Private set intersection protocols allow two parties with private sets of data to compute the inters...
Private set intersection(PSI) is a two party protocol where both parties possess a private set and a...
In this work we demonstrate that allowing differentially private leakage can significantly improve t...
© 2017 Kim Sasha RamchenA fundamental problem in large distributed systems is how to enable parties ...
We present two unconditional secure protocols for private set disjointness tests. In order to provid...
Abstract. This paper presents an efficient construction of a private disjointness testing protocol t...
Two parties, say Alice and Bob, possess two sets of elements that belong to a universe of possible ...
When datasets are distributed on different sources, find-ing out their intersection while preserving...
We consider the problem of computing the intersection of private datasets of two parties, where the ...
In many distributed data mining settings, disclosure of theoriginal data sets is not acceptable due ...
Private set intersection is an important area of research and has been the focus of many works over ...
When datasets are distributed on different sources, finding out matched data while preserving the pr...
Large scale data processing brings new challenges to the design of privacy-preserving protocols: how...
Abstract: "In this paper we consider the problem of privately computing the intersection of sets (se...
We present a new paradigm for multi-party private set intersection (PSI) that allows $n$ parties to ...
Private set intersection protocols allow two parties with private sets of data to compute the inters...
Private set intersection(PSI) is a two party protocol where both parties possess a private set and a...
In this work we demonstrate that allowing differentially private leakage can significantly improve t...
© 2017 Kim Sasha RamchenA fundamental problem in large distributed systems is how to enable parties ...