نتایج جستجو برای: private set intersection psi

تعداد نتایج: 782316  

Journal: :J. Internet Serv. Inf. Secur. 2012
Atsuko Miyaji Mohammad Shahriar Rahman

Many data mining algorithms use privacy preserving set intersection operations. Private set operations have considered semi-honest and malicious adversarial models in cryptographic settings. Protocols in semi-honest model, requiring light computations, provide weak security. Protocols in malicious model guarantee strong security at the price of expensive computations like homomorphic encryption...

Journal: :IACR Cryptology ePrint Archive 2017
Satrajit Ghosh Tobias Nilges

Private set intersection is an important area of research and has been the focus of many works over the past decades. It describes the problem of finding an intersection between the input sets of at least two parties without revealing anything about the input sets apart from their intersection. In this paper, we present a new approach to compute the intersection between sets based on a primitiv...

2012
Arjun Narayan Andreas Haeberlen

In this paper, we study the problem of answering queries about private data that is spread across multiple different databases. For instance, a medical researcher may want to study a possible correlation between travel patterns and certain types of illnesses. The necessary information exists today – e.g., in airline reservation systems and hospital records – but it is maintained by two separate...

Journal: :Journal of Combinatorial Theory, Series A 1982

Journal: :IACR Cryptology ePrint Archive 2015
Yongjun Zhao Sherman S. M. Chow

Sharing information to others is common nowadays, but the question is with whom to share. To address this problem, we propose the notion of secret transfer with access structure (STAS). STAS is a two-party computation protocol that enables the server to transfer a secret to a client who satisfies the prescribed access structure. In this paper, we focus on the case of STAS for threshold access s...

2008
HANNAH MARKWIG JOHANNES RAU

We define tropical Psi-classes on M 0,n (R 2 , d) and consider intersection products of Psi-classes and pull-backs of evaluations on this space. We show a certain WDVV equation which is sufficient to prove that tropical numbers of curves satisfying certain Psi-and evaluation conditions are equal to the corresponding classical numbers. We present an algorithm that generalizes Mikhalkin's lattice...

2009
G. Sathya Narayanan T. Aishwarya Anugrah Agrawal Arpita Patra Ashish Choudhury C. Pandu Rangan

In this paper, we focus on the specific problems of Private Matching, Set Disjointness and Cardinality of Set Intersection in information theoretic settings. Specifically, we give perfectly secure protocols for the above problems in n party settings, tolerating a computationally unbounded semi-honest adversary, who can passively corrupt at most t < n/2 parties. To the best of our knowledge, the...

Journal: :IACR Cryptology ePrint Archive 2009
G. Sathya Narayanan T. Aishwarya Anugrah Agrawal Arpita Patra Ashish Choudhury C. Pandu Rangan

In this paper, we focus on the specific problems of Private Matching, Set Disjointness and Cardinality Set Intersection in information theoretic settings. Specifically, we give perfectly secure protocols for the above problems in n party settings, tolerating a computationally unbounded semi-honest adversary, who can passively corrupt at most t < n/2 parties. To the best of our knowledge, these ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید