We present a new paradigm for multi-party private set intersection (PSI) that allows $n$ parties to compute the intersection of their datasets without revealing any additional information. We explore a variety of instantiations of this paradigm. Our protocols avoid computationally expensive public-key operations and are secure in the presence of any number of semi-honest participants (i.e., without an honest majority). We demonstrate the practicality of our protocols with an implementation. To the best of our knowledge, this is the first implementation of a multi-party PSI protocol. For 5 parties with data-sets of $2^{20}$ items each, our protocol requires only $72$ seconds. In an optimization achieving a slightly weaker variant of secu...
Private set intersection(PSI) is a two party protocol where both parties possess a private set and a...
Private set intersection is an important area of research and has been the focus of many works over ...
Private set intersection and related functionalities are among the most prominent real-world applica...
Privacy-preserving techniques for processing sets of information have attracted the research communi...
Privacy-preserving techniques for processing sets of information have attracted the research communi...
In this paper, we present a concretely efficient protocol for private set intersection (PSI) in the ...
Private set intersection (PSI) allows two parties, who each hold a set of items, to compute the inte...
We describe a new paradigm for multi-party private set intersection cardinality (\psica) that allow...
Private set intersection protocols allow two parties with private sets of data to compute the inters...
Private Set Intersection (PSI) is a cryptographic primitive that allows two network connected partie...
Protocols for Private Set Intersection (PSI) are important cryptographic primitives that perform joi...
Private set intersection reveals the intersection of two private sets, but many real-world applicati...
We propose a novel protocol for computing a circuit which implements the multi-party private set int...
Private set intersection (PSI) is a secure multi-party computation technique that allows several par...
In this paper, we propose a new private set intersection (PSI) protocol with bi-oblivious data trans...
Private set intersection(PSI) is a two party protocol where both parties possess a private set and a...
Private set intersection is an important area of research and has been the focus of many works over ...
Private set intersection and related functionalities are among the most prominent real-world applica...
Privacy-preserving techniques for processing sets of information have attracted the research communi...
Privacy-preserving techniques for processing sets of information have attracted the research communi...
In this paper, we present a concretely efficient protocol for private set intersection (PSI) in the ...
Private set intersection (PSI) allows two parties, who each hold a set of items, to compute the inte...
We describe a new paradigm for multi-party private set intersection cardinality (\psica) that allow...
Private set intersection protocols allow two parties with private sets of data to compute the inters...
Private Set Intersection (PSI) is a cryptographic primitive that allows two network connected partie...
Protocols for Private Set Intersection (PSI) are important cryptographic primitives that perform joi...
Private set intersection reveals the intersection of two private sets, but many real-world applicati...
We propose a novel protocol for computing a circuit which implements the multi-party private set int...
Private set intersection (PSI) is a secure multi-party computation technique that allows several par...
In this paper, we propose a new private set intersection (PSI) protocol with bi-oblivious data trans...
Private set intersection(PSI) is a two party protocol where both parties possess a private set and a...
Private set intersection is an important area of research and has been the focus of many works over ...
Private set intersection and related functionalities are among the most prominent real-world applica...