Efficient laconic cryptography from learning with errors

N Döttling, D Kolonelos, RWF Lai, C Lin… - … Conference on the …, 2023 - Springer
Laconic cryptography is an emerging paradigm that enables cryptographic primitives with
sublinear communication complexity in just two messages. In particular, a two-message …

Efficient multi-party private set intersection protocols for large participants and small sets

L Wei, J Liu, L Zhang, Q Wang, W Zhang… - Computer Standards & …, 2024 - Elsevier
Private set intersection (PSI) has attracted the researchers and the developers both from
academia and industry in cooperating the private data to achieve privacy preserving …

Efficient Set Membership Encryption and Applications

M Green, A Jain, G Van Laer - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
The emerging area of laconic cryptography [Cho et al., CRYPTO'17] involves the design of
two-party protocols involving a sender and a receiver, where the receiver's input is large …

Scalable multi-party private set union from multi-query secret-shared private membership test

X Liu, Y Gao - International Conference on the Theory and …, 2023 - Springer
Multi-party private set union (MPSU) allows k (k≥ 3) parties, each holding a dataset of
known size, to compute the union of their sets without revealing any additional information …

Unbalanced private set intersection with linear communication complexity

Q Zhao, B Jiang, Y Zhang, H Wang, Y Mao… - Science China …, 2024 - Springer
The private set intersection (PSI) protocol allows two parties holding a set of integers to
compute the intersection of their sets without revealing any additional information to each …

Cloud-Assisted Laconic Private Set Intersection Cardinality

A Wu, X Xin, J Zhu, W Liu, C Song… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Laconic Private Set Intersection (LPSI) is a type of PSI protocols characterized by the
requirement of only two-round interactions and by having a reused message in the first …

Practical and malicious private set intersection with improved efficiency

Y Zhu, L Chen, Y Mu - Theoretical Computer Science, 2024 - Elsevier
We propose a novel two-party private set intersection (PSI) protocol, which achieves ideal
and constant receiver-to-sender and linear sender-to-receiver communication overhead …

Laconic Branching Programs from the Diffie-Hellman Assumption

S Garg, M Hajiabadi, P Miao, A Murphy - IACR International Conference …, 2024 - Springer
Laconic cryptography enables secure two-party computation (2PC) on unbalanced inputs
with asymptotically-optimal communication in just two rounds of communication. In …

More efficient (reusable) private set union

D Gordon, C Hazay, PH Le, M Liang - Cryptology ePrint Archive, 2022 - eprint.iacr.org
We study the problem of private set union in the two-party setting, providing several new
constructions. We consider the case where one party is designated to receive output. In the …

Unbalanced Private Set Intersection from Homomorphic Encryption and Nested Cuckoo Hashing

J Kußmaul, M Akram, A Tueno - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Abstract Private Set Intersection (PSI) is a well-studied secure two-party computation
problem in which a client and a server want to compute the intersection of their input sets …