When private set intersection meets big data: an efficient and scalable protocol

C Dong, L Chen, Z Wen - Proceedings of the 2013 ACM SIGSAC …, 2013 - dl.acm.org
Large scale data processing brings new challenges to the design of privacy-preserving
protocols: how to meet the increasing requirements of speed and throughput of modern …

An efficient privacy-preserving outsourced calculation toolkit with multiple keys

X Liu, RH Deng, KKR Choo… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we propose a toolkit for efficient and privacy-preserving outsourced calculation
under multiple encrypted keys (EPOM). Using EPOM, a large scale of users can securely …

Secure and private control using semi-homomorphic encryption

F Farokhi, I Shames, N Batterham - Control Engineering Practice, 2017 - Elsevier
Networked control systems with encrypted sensors measurements is considered. Semi-
homomorphic encryption, specifically the Paillier encryption, is used so that the controller …

Object cosegmentation

S Vicente, C Rother, V Kolmogorov - CVPR 2011, 2011 - ieeexplore.ieee.org
Cosegmentation is typically defined as the task of jointly segmenting “something similar” in a
given set of images. Existing methods are too generic and so far have not demonstrated …

Efficient and privacy-preserving outsourced calculation of rational numbers

X Liu, KKR Choo, RH Deng, R Lu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we propose a framework for efficient and privacy-preserving outsourced
calculation of rational numbers, which we refer to as POCR. Using POCR, a user can …

Catalic: Delegated PSI cardinality with applications to contact tracing

T Duong, DH Phan, N Trieu - International Conference on the Theory and …, 2020 - Springer
Abstract Private Set Intersection Cardinality (PSI-CA) allows two parties, each holding a set
of items, to learn the size of the intersection of those sets without revealing any additional …

Scaling private set intersection to billion-element sets

S Kamara, P Mohassel, M Raykova… - … Cryptography and Data …, 2014 - Springer
We examine the feasibility of private set intersection (PSI) over massive datasets. PSI, which
allows two parties to find the intersection of their sets without revealing them to each other …

Practical multi-party private set intersection protocols

A Bay, Z Erkin, JH Hoepman… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Privacy-preserving techniques for processing sets of information have attracted the research
community's attention in recent years due to society's increasing dependency on the …

Searchable encryption on the cloud: a survey

N Andola, R Gahlot, VK Yadav, S Venkatesan… - The Journal of …, 2022 - Springer
Outsourcing data to the cloud can be considered as a perfect solution for the storage and
computationally constrained data owners. However, data confidentiality is compromised …

Geometric range search on encrypted spatial data

B Wang, M Li, H Wang - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
Geometric range search is a fundamental primitive for spatial data analysis in SQL and
NoSQL databases. It has extensive applications in location-based services, computer-aided …