نتایج جستجو برای: private set intersection psi

تعداد نتایج: 782316  

2014
L. Ertaul A. M. Mehta T. K. Wu

Today we are in the era of Big Data. The design of privacy preserving protocols in data processing is really challenging as the amount of data grows largely and complex. How to preserve privacy while meeting the requirements of speed and throughput have become critical criteria in the design. In this paper, we implement a practical use of Private Set Intersection (PSI) Protocol based on the new...

2017
Aydin Abadi Sotirios Terzis Roberto Metere Changyu Dong

Private set intersection (PSI) is an essential cryptographic protocol that has many real world applications. As cloud computing power and popularity have been swiftly growing, it is now desirable to leverage the cloud to store private datasets and delegate PSI computation to it. Although a set of efficient PSI protocols have been designed, none support outsourcing of the datasets and the comput...

2014
Seny Kamara Payman Mohassel Mariana Raykova Seyed Saeed Sadeghian

We examine the feasibility of private set intersection (PSI) over massive datasets. PSI, which allows two parties to find the intersection of their sets without revealing them to each other, has numerous applications including to privacy-preserving data mining, location-based services and genomic computations. Unfortunately, the most efficient constructions only scale to sets containing a few t...

Journal: :IACR Cryptology ePrint Archive 2016
Alex Davidson Carlos Cid

Private set operation (PSO) protocols provide a natural way of securely performing operations on data sets, such that crucial details of the input sets are not revealed. Such protocols have an everincreasing number of practical applications, particularly when implementing privacy-preserving data mining schemes. Protocols for computing private set operations have been prevalent in multi-party co...

2010
Emiliano De Cristofaro Gene Tsudik

The constantly increasing dependence on anytime-anywhere availability of data and the commensurately increasing fear of losing privacy motivate the need for privacy-preserving techniques. One interesting and common problem occurs when two parties need to privately compute an intersection of their respective sets of data. In doing so, one or both parties must obtain the intersection (if one exis...

2009
Emiliano De Cristofaro Gene Tsudik

The constantly increasing dependence on anytime-anywhere availability of data and the commensurately increasing fear of losing privacy motivate the need for privacy-preserving techniques. One interesting and common problem occurs when two parties need to privately compute an intersection of their respective sets of data. In doing so, one or both parties must obtain the intersection (if one exis...

Journal: :IACR Cryptology ePrint Archive 2012
Changyu Dong Liqun Chen Jan Camenisch Giovanni Russello

A private set intersection (PSI) protocol allows two parties to compute the intersection of their input sets privately. Most of the previous PSI protocols only output the result to one party and the other party gets nothing from running the protocols. However, a mutual PSI protocol in which both parties can get the output is highly desirable in many applications. A major obstacle in designing a...

Journal: :IEEE Access 2021

Threshold private set intersection (TPSI) allows a receiver to obtain the when cardinality of is greater or equal threshold, which has wide range applications such as fingerprint matching, online dating and ridesharing. Existing TPSI protocols are inefficient because almost all them rely on lots expensive public-key techniques require an exponential number possible combinations among shares. In...

2012
Yan Huang David Evans Jonathan Katz

Cryptographic protocols for Private Set Intersection (PSI) are the basis for many important privacy-preserving applications. Over the past few years, intensive research has been devoted to designing custom protocols for PSI based on homomorphic encryption and other public-key techniques, apparently due to the belief that solutions using generic approaches would be impractical. This paper explor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید