Efficient private matching and set intersection

MJ Freedman, K Nissim, B Pinkas - … on the theory and applications of …, 2004 - Springer
We consider the problem of computing the intersection of private datasets of two parties,
where the datasets contain lists of elements taken from a large domain. This problem has …

A fuzzy vault scheme

A Juels, M Sudan - Designs, Codes and Cryptography, 2006 - Springer
We describe a simple and novel cryptographic construction that we refer to as a fuzzy vault.
A player Alice may place a secret value κ in a fuzzy vault and “lock” it using a set A of …

Privacy-preserving set operations

L Kissner, D Song - Annual International Cryptology Conference, 2005 - Springer
In many important applications, a collection of mutually distrustful parties must perform
private computation over multisets. Each party's input to the function is his private input …

SoK: secure messaging

N Unger, S Dechand, J Bonneau, S Fahl… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Motivated by recent revelations of widespread state surveillance of personal communication,
many solutions now claim to offer secure and private messaging. This includes both a large …

[PDF][PDF] Location privacy via private proximity testing.

A Narayanan, N Thiagarajan, M Lakhani, M Hamburg… - NDSS, 2011 - crypto.stanford.edu
We study privacy-preserving tests for proximity: Alice can test if she is close to Bob without
either party revealing any other information about their location. We describe several secure …

An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement

XB Chen, G Xu, XX Niu, QY Wen, YX Yang - Optics communications, 2010 - Elsevier
The central theme of this paper is that we propose an efficient protocol for comparing the
equal information with the help of a third party (TP). We assume that TP is semi-honest, ie …

Scaling private set intersection to billion-element sets

S Kamara, P Mohassel, M Raykova… - … Cryptography and Data …, 2014 - Springer
We examine the feasibility of private set intersection (PSI) over massive datasets. PSI, which
allows two parties to find the intersection of their sets without revealing them to each other …

New quantum private comparison protocol using EPR pairs

HY Tseng, J Lin, T Hwang - Quantum Information Processing, 2012 - Springer
Based on EPR pairs, this paper proposes a different quantum private comparison (QPC)
protocol enabling two parties to compare the equality of their information without revealing …

Efficient robust private set intersection

D Dachman-Soled, T Malkin… - … Journal of Applied …, 2012 - inderscienceonline.com
Computing set intersection privately and efficiently between two mutually mistrusting parties
is an important basic procedure in the area of private data mining. Assuring robustness …

A secure distributed framework for achieving k-anonymity

W Jiang, C Clifton - The VLDB journal, 2006 - Springer
Abstract k-anonymity provides a measure of privacy protection by preventing re-identification
of data to fewer than a group of k data items. While algorithms exist for producing k …