Given the original set $X$ where $|X|=s$, a sketch $P$ is computed from $X$ and made public. From another set $Y$ where $|Y| = s$ and $P$, we can reconstruct $X$ if $|X\cap Y|\ge |s-t|$, where $t<s$ is some threshold. The sketch $P$ is secure if it does not reveal much information about $X$. A few constructions have been proposed, but they cannot handle multi-sets, that is, sets that may contain duplicate elements. We observe that the techniques in the set reconciliation protocol proposed by Minsky et al. (ISIT 2001) can be applied and give a secure sketch that supports multi-sets. If $X$ is a subset of an universe with $n$ elements, the running time of the encoding and decoding algorithms will be polynomial w.r.t. $s$ and $\log n$, and the...
In a multi-secret sharing scheme (MSSS), different secrets are distributed among the players in some...
Threshold secret sharing schemes enable a dealer to share a secret among $n$ parties such that only ...
Private Set Intersection protocols (PSIs) allow parties to compute the intersection of their private...
Given the original set X where |X| = s, a sketch P is computed from X and made public. From another ...
Set reconciliation is the problem of efficiently computing the difference be-tween two sets of data ...
A secure sketch is a set of published data that can help to recover the original biometric data afte...
Imagine handling collisions in a hash table by storing, in each cell, the bit-wise exclusive-or of t...
Secure sketch conceals any random string w by generating a helper string ss (known as a sketch). It ...
Abstract. A noisy non-uniformly distributed secret often needs to be transformed into a stable high-...
Abstract. Motivated by the representation of biometric and multime-dia objects, we consider the prob...
A multi-secret sharing scheme is a protocol to share more than one secret among a set of participan...
Range-based set reconciliation is a simple approach to efficiently computing the union of two sets o...
Data sketching is a critical tool for distinct counting, enabling multisets to be represented by com...
We formalize a realistic model for computations over massive data sets. The model, re-ferred to as t...
Secure computation of the set intersection functionality allows $n$ parties to find the intersection...
In a multi-secret sharing scheme (MSSS), different secrets are distributed among the players in some...
Threshold secret sharing schemes enable a dealer to share a secret among $n$ parties such that only ...
Private Set Intersection protocols (PSIs) allow parties to compute the intersection of their private...
Given the original set X where |X| = s, a sketch P is computed from X and made public. From another ...
Set reconciliation is the problem of efficiently computing the difference be-tween two sets of data ...
A secure sketch is a set of published data that can help to recover the original biometric data afte...
Imagine handling collisions in a hash table by storing, in each cell, the bit-wise exclusive-or of t...
Secure sketch conceals any random string w by generating a helper string ss (known as a sketch). It ...
Abstract. A noisy non-uniformly distributed secret often needs to be transformed into a stable high-...
Abstract. Motivated by the representation of biometric and multime-dia objects, we consider the prob...
A multi-secret sharing scheme is a protocol to share more than one secret among a set of participan...
Range-based set reconciliation is a simple approach to efficiently computing the union of two sets o...
Data sketching is a critical tool for distinct counting, enabling multisets to be represented by com...
We formalize a realistic model for computations over massive data sets. The model, re-ferred to as t...
Secure computation of the set intersection functionality allows $n$ parties to find the intersection...
In a multi-secret sharing scheme (MSSS), different secrets are distributed among the players in some...
Threshold secret sharing schemes enable a dealer to share a secret among $n$ parties such that only ...
Private Set Intersection protocols (PSIs) allow parties to compute the intersection of their private...