Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society 2019
DOI: 10.1145/3338498.3358645
|View full text |Cite
|
Sign up to set email alerts
|

Private Set Intersection with Linear Communication from General Assumptions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 36 publications
0
9
0
Order By: Relevance
“…Instead, such a filter contains bins that can contain multiple entries, and they are merely used as a binning technique to limit the number of pairwise comparisons. There exist other such binning techniques as well [29], [30]. The protocol by Pinkas et al [30], for example, performs a private set inclusion protocol for each element in one party's set with regard to the others set to find the intersection.…”
Section: Introductionmentioning
confidence: 99%
“…Instead, such a filter contains bins that can contain multiple entries, and they are merely used as a binning technique to limit the number of pairwise comparisons. There exist other such binning techniques as well [29], [30]. The protocol by Pinkas et al [30], for example, performs a private set inclusion protocol for each element in one party's set with regard to the others set to find the intersection.…”
Section: Introductionmentioning
confidence: 99%
“…Due to its practical relevance, PSI protocols in the server-aided model have been proposed as well [KMRS14]. Independent and concurrent works [PSWW18,FNO18] (which were not publicly available at time we first posted our paper on ePrint) consider the problem of using a PSI protocol to construct more complex functionality in an efficient way. More specifically, [PSWW18] provides a way to securely compute many variants of the set intersection functionality using a clever combination of Cuckoo hashing and garbled circuit.…”
Section: Introductionmentioning
confidence: 99%
“…More specifically, [PSWW18] provides a way to securely compute many variants of the set intersection functionality using a clever combination of Cuckoo hashing and garbled circuit. The work of Falk et al [FNO18] focuses on obtaining a PSI protocol that is efficient in terms of communication. In addition, the authors of [FNO18] propose a PSI protocol where the output can be secret shared that has communication complexity of O(mλ log log m), where λ is the bit-length of the elements and m is the set-size.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations