We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the intersection cardinality. More specifically, it discloses its lower bound. By using the Lagrange interpolation, we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. In this protocol, a verification test is applied to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previ...
Linear algebra operations on private distributed data are frequently required in several practical s...
We propose in this work to solve privacy preserving set relations performed by a third party in an o...
We propose the first multi-client predicate-only encryption scheme capable of efficiently testing th...
We present two unconditional secure protocols for private set disjointness tests. In order to provid...
We present efficient protocols for private set disjointness tests. We start from an intuition of our...
Abstract. This paper presents an efficient construction of a private disjointness testing protocol t...
Two parties, say Alice and Bob, possess two sets of elements that belong to a universe of possible ...
In many distributed data mining settings, disclosure of theoriginal data sets is not acceptable due ...
When datasets are distributed on different sources, find-ing out their intersection while preserving...
Private set intersection is an important area of research and has been the focus of many works over ...
The Jaccard Coefficient, as an information similarity measure, has wide variety of applications, suc...
We consider the problem of computing the intersection of private datasets of two parties, where the ...
We revisit the problem of constructing efficient secure two-party protocols for the problems of set-...
Private set intersection(PSI) is a two party protocol where both parties possess a private set and a...
In this paper we focus on protocols for private set intersection (PSI), through which two parties, e...
Linear algebra operations on private distributed data are frequently required in several practical s...
We propose in this work to solve privacy preserving set relations performed by a third party in an o...
We propose the first multi-client predicate-only encryption scheme capable of efficiently testing th...
We present two unconditional secure protocols for private set disjointness tests. In order to provid...
We present efficient protocols for private set disjointness tests. We start from an intuition of our...
Abstract. This paper presents an efficient construction of a private disjointness testing protocol t...
Two parties, say Alice and Bob, possess two sets of elements that belong to a universe of possible ...
In many distributed data mining settings, disclosure of theoriginal data sets is not acceptable due ...
When datasets are distributed on different sources, find-ing out their intersection while preserving...
Private set intersection is an important area of research and has been the focus of many works over ...
The Jaccard Coefficient, as an information similarity measure, has wide variety of applications, suc...
We consider the problem of computing the intersection of private datasets of two parties, where the ...
We revisit the problem of constructing efficient secure two-party protocols for the problems of set-...
Private set intersection(PSI) is a two party protocol where both parties possess a private set and a...
In this paper we focus on protocols for private set intersection (PSI), through which two parties, e...
Linear algebra operations on private distributed data are frequently required in several practical s...
We propose in this work to solve privacy preserving set relations performed by a third party in an o...
We propose the first multi-client predicate-only encryption scheme capable of efficiently testing th...