2022
DOI: 10.1109/tcc.2020.2968320
|View full text |Cite
|
Sign up to set email alerts
|

Tag-Based Verifiable Delegated Set Intersection Over Outsourced Private Datasets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 36 publications
0
8
0
Order By: Relevance
“…Wang et al [32] proposed a tag-based verifiable outsourced PSI protocol (TVDPSI) for the multisubset case, where each subset was associated with a separate tag for data classification. Liu and Zhang [11] proposed a fine-grained profile matching scheme with multiple tags attached to a subset of users for classification to achieve fine-grained matching.…”
Section: Privacy Protectionmentioning
confidence: 99%
“…Wang et al [32] proposed a tag-based verifiable outsourced PSI protocol (TVDPSI) for the multisubset case, where each subset was associated with a separate tag for data classification. Liu and Zhang [11] proposed a fine-grained profile matching scheme with multiple tags attached to a subset of users for classification to achieve fine-grained matching.…”
Section: Privacy Protectionmentioning
confidence: 99%
“…e data user and the data owner would like to outsource their data sets to the cloud and delegate set intersection computation to the cloud. [5,7,11]. Moreover, public key encryption with equality test [12][13][14][15] can also be used to attain this goal.…”
Section: Related Workmentioning
confidence: 99%
“…In this scenario, the data users (i.e., the IoT-enabled devices) will encrypt and outsource their data sets to the cloud and then delegate the cloud to perform the set intersection. It has been studied by some works [5][6][7]. But it indeed raises a concern on how to enforce fine-grained access control for limiting the cloud's capability on computing set intersection.…”
Section: Introductionmentioning
confidence: 99%
“…Instead, the cloud users expect to outsource them to the cloud in encrypted form and entrust the cloud to help them complete the set intersection operation. While several works have studied PSI over outsourced encrypted data in the cloud [2][3][4], it certainly raises a difficulty for the data owners on how to enforce that their encrypted data can be used to perform by only some specific users. That is, how can the data owners limit the ability for the data users on performing set intersection by complying with certain control policies.…”
Section: Introductionmentioning
confidence: 99%
“…Section 2), none of the existing schemes consider this problem how to achieve the following objectives simultaneously: (1) All cloud users should outsource their data sets in the ciphertext form to the cloud. (2) The cloud users should be able to preserve data privacy while allowing the set intersection delegation to the cloud. (3) The cloud users should be able to accomplish fine-grained access control to the set operation permissions over their outsourced encrypted data sets.…”
Section: Introductionmentioning
confidence: 99%