Proceedings of the 2013 ACM SIGSAC Conference on Computer &Amp; Communications Security - CCS '13 2013
DOI: 10.1145/2508859.2516701
|View full text |Cite
|
Sign up to set email alerts
|

When private set intersection meets big data

Abstract: Large scale data processing brings new challenges to the design of privacy-preserving protocols: how to meet the increasing requirements of speed and throughput of modern applications, and how to scale up smoothly when data being protected is big. Efficiency and scalability become critical criteria for privacy preserving protocols in the age of Big Data. In this paper, we present a new Private Set Intersection (PSI) protocol that is extremely efficient and highly scalable compared with existing protocols. The … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
213
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 313 publications
(215 citation statements)
references
References 31 publications
1
213
0
1
Order By: Relevance
“…Following that many protocols such as [4], [21], [22], [23], [24], [25], [26], [27] were proposed. Among them, [21] provides a number of protocols supporting further private set operations based on additive homomorphic encryption and polynomial representation of sets.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Following that many protocols such as [4], [21], [22], [23], [24], [25], [26], [27] were proposed. Among them, [21] provides a number of protocols supporting further private set operations based on additive homomorphic encryption and polynomial representation of sets.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, [23], [24] proposed PSI protocols that allow result recipients to hide their set size from the other party during the computation of the intersection, while [24] also proposed protocols that output only the cardinality of the intersection. More recently, some efficient protocols, like [25], [26], [27], have been proposed. The protocols in [25] use Bloom filters, secret sharing and oblivious transfer to offer efficient PSI.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…if the set of shares can reconstruct the secret in the LSSS. To obtain a privacy-preserving protocol for SPC, the oblivious bloom intersection (OBI) from [16] is used. The server constructs an LSSS that only users who fulfil the policy can obtain the right shares from the OBI and recover the secret.…”
Section: Introductionmentioning
confidence: 99%