[HTML][HTML] Private set intersection: A systematic literature review
Abstract Secure Multi-party Computation (SMPC) is a family of protocols which allow some
parties to compute a function on their private inputs, obtaining the output at the end and …
parties to compute a function on their private inputs, obtaining the output at the end and …
A survey of oblivious transfer protocol
Oblivious transfer (OT) protocol is an essential tool in cryptography that provides a wide
range of applications such as secure multi-party computation, private information retrieval …
range of applications such as secure multi-party computation, private information retrieval …
Sok: Secure aggregation based on cryptographic schemes for federated learning
M Mansouri, M Önen, WB Jaballah… - Proceedings on Privacy …, 2023 - petsymposium.org
Secure aggregation consists of computing the sum of data collected from multiple sources
without disclosing these individual inputs. Secure aggregation has been found useful for …
without disclosing these individual inputs. Secure aggregation has been found useful for …
Efficient circuit-based PSI with linear communication
We present a new protocol for computing a circuit which implements the private set
intersection functionality (PSI). Using circuits for this task is advantageous over the usage of …
intersection functionality (PSI). Using circuits for this task is advantageous over the usage of …
Labeled PSI from fully homomorphic encryption with malicious security
Private Set Intersection (PSI) allows two parties, the sender and the receiver, to compute the
intersection of their private sets without revealing extra information to each other. We are …
intersection of their private sets without revealing extra information to each other. We are …
On deploying secure computing: Private intersection-sum-with-cardinality
In this work, we discuss our successful efforts for industry deployment of a cryptographic
secure computation protocol. The problem we consider is privately computing aggregate …
secure computation protocol. The problem we consider is privately computing aggregate …
{Communication–Computation} trade-offs in {PIR}
Communication–Computation Trade-offs in PIR Page 1 This paper is included in the Proceedings
of the 30th USENIX Security Symposium. August 11–13, 2021 978-1-939133-24-3 Open access to …
of the 30th USENIX Security Symposium. August 11–13, 2021 978-1-939133-24-3 Open access to …
Circuit-PSI with linear complexity via relaxed batch OPPRF
In 2-party Circuit-based Private Set Intersection (Circuit-PSI), P0 and P1 hold sets S0 and S1
respectively and wish to securely compute a function f over the set S0∩ S1 (eg, cardinality …
respectively and wish to securely compute a function f over the set S0∩ S1 (eg, cardinality …
VOLE-PSI: fast OPRF and circuit-PSI from vector-OLE
P Rindal, P Schoppmann - Annual International Conference on the Theory …, 2021 - Springer
In this work we present a new construction for a batched Oblivious Pseudorandom Function
(OPRF) based on Vector-OLE and the PaXoS data structure. We then use it in the standard …
(OPRF) based on Vector-OLE and the PaXoS data structure. We then use it in the standard …
Private set operations from oblivious switching
Private set intersection reveals the intersection of two private sets, but many real-world
applications require the parties to learn only partial information about the intersection. In this …
applications require the parties to learn only partial information about the intersection. In this …