Efficient private matching and set intersection
We consider the problem of computing the intersection of private datasets of two parties,
where the datasets contain lists of elements taken from a large domain. This problem has …
where the datasets contain lists of elements taken from a large domain. This problem has …
A fuzzy vault scheme
We describe a simple and novel cryptographic construction that we refer to as a fuzzy vault.
A player Alice may place a secret value κ in a fuzzy vault and “lock” it using a set A of …
A player Alice may place a secret value κ in a fuzzy vault and “lock” it using a set A of …
Privacy-preserving set operations
L Kissner, D Song - Annual International Cryptology Conference, 2005 - Springer
In many important applications, a collection of mutually distrustful parties must perform
private computation over multisets. Each party's input to the function is his private input …
private computation over multisets. Each party's input to the function is his private input …
SoK: secure messaging
Motivated by recent revelations of widespread state surveillance of personal communication,
many solutions now claim to offer secure and private messaging. This includes both a large …
many solutions now claim to offer secure and private messaging. This includes both a large …
[PDF][PDF] Location privacy via private proximity testing.
A Narayanan, N Thiagarajan, M Lakhani, M Hamburg… - NDSS, 2011 - crypto.stanford.edu
We study privacy-preserving tests for proximity: Alice can test if she is close to Bob without
either party revealing any other information about their location. We describe several secure …
either party revealing any other information about their location. We describe several secure …
An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement
XB Chen, G Xu, XX Niu, QY Wen, YX Yang - Optics communications, 2010 - Elsevier
The central theme of this paper is that we propose an efficient protocol for comparing the
equal information with the help of a third party (TP). We assume that TP is semi-honest, ie …
equal information with the help of a third party (TP). We assume that TP is semi-honest, ie …
Scaling private set intersection to billion-element sets
We examine the feasibility of private set intersection (PSI) over massive datasets. PSI, which
allows two parties to find the intersection of their sets without revealing them to each other …
allows two parties to find the intersection of their sets without revealing them to each other …
New quantum private comparison protocol using EPR pairs
HY Tseng, J Lin, T Hwang - Quantum Information Processing, 2012 - Springer
Based on EPR pairs, this paper proposes a different quantum private comparison (QPC)
protocol enabling two parties to compare the equality of their information without revealing …
protocol enabling two parties to compare the equality of their information without revealing …
Efficient robust private set intersection
D Dachman-Soled, T Malkin… - … Journal of Applied …, 2012 - inderscienceonline.com
Computing set intersection privately and efficiently between two mutually mistrusting parties
is an important basic procedure in the area of private data mining. Assuring robustness …
is an important basic procedure in the area of private data mining. Assuring robustness …
A secure distributed framework for achieving k-anonymity
W Jiang, C Clifton - The VLDB journal, 2006 - Springer
Abstract k-anonymity provides a measure of privacy protection by preventing re-identification
of data to fewer than a group of k data items. While algorithms exist for producing k …
of data to fewer than a group of k data items. While algorithms exist for producing k …