2021
DOI: 10.1007/978-3-030-75248-4_13
|View full text |Cite
|
Sign up to set email alerts
|

Multi-party Threshold Private Set Intersection with Sublinear Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(28 citation statements)
references
References 36 publications
0
28
0
Order By: Relevance
“…Private intersection cardinality testing (PICT) refers to the problem of testing whether the intersection between sets of di erent parties is larger than a threshold T . Existing protocols that solve the PICT problem (e.g., [3,10,12]) are either only designed for the two-party case or for the multi-party case where each party inputs a private set and it is checked whether the size of the intersection of all these sets is larger than T . However, the privacy-preserving compatibility check for kidney exchange (cf.…”
Section: Private Intersection Cardinality Testingmentioning
confidence: 99%
See 1 more Smart Citation
“…Private intersection cardinality testing (PICT) refers to the problem of testing whether the intersection between sets of di erent parties is larger than a threshold T . Existing protocols that solve the PICT problem (e.g., [3,10,12]) are either only designed for the two-party case or for the multi-party case where each party inputs a private set and it is checked whether the size of the intersection of all these sets is larger than T . However, the privacy-preserving compatibility check for kidney exchange (cf.…”
Section: Private Intersection Cardinality Testingmentioning
confidence: 99%
“…And even if all such criteria are met, this is not a guarantee that a transplant can be executed between what was determined to be a compatible patient and donor. In fact, the nal decision as to whether a transplant should be carried out, lies with an experienced medical professional 3 . Consequently, our compatibility check gate is designed to include only such checks of criteria that in case they do not match between a donor and a patient render a transplant impossible.…”
Section: Relevant Medical Datamentioning
confidence: 99%
“…The state-of-the-art protocol is due to Ghosh and Simkin [9], which builds on the idea of set reconciliation by Minsky et al [25] and uses oblivious polynomial evaluation as the underlying secure two-party cryptographic primitive. A similar construction by Badrinarayanan et al [2] replaces OPE with an additively homomorphic encryption scheme. Privacy-Preserving Proximity Detection: A loosely related task to DA-PSI is privacy-preserving proximity detection [27,42], wherein a trusted user of a service (say Alice) wants to learn if another user known to her (say Bob) is currently nearby.…”
Section: Related Workmentioning
confidence: 99%
“…The protocol does not have false negatives. Key Idea: The key observation behind the protocol is that F t-HQ ,d M ,d H can be realized as a two-step process: i) uniquely map the input vectors to sets, and ii) run a threshold PSI protocol [2,9] with these sets as inputs. For the first step, any deterministic mappings φ 1 , .…”
Section: Threshold Hamming Queriesmentioning
confidence: 99%
See 1 more Smart Citation