[HTML][HTML] Private set intersection: A systematic literature review

D Morales, I Agudo, J Lopez - Computer Science Review, 2023 - Elsevier
Abstract Secure Multi-party Computation (SMPC) is a family of protocols which allow some
parties to compute a function on their private inputs, obtaining the output at the end and …

Can you find the one for me?

Y Zhao, SSM Chow - Proceedings of the 2018 Workshop on Privacy in …, 2018 - dl.acm.org
Private set-intersection (PSI) allows a client to only learn the intersection between his/her set
C and the set S of another party, while this latter party learns nothing. We aim to enhance …

Vertical Federated Density Peaks Clustering under Nonlinear Mapping

C Li, S Ding, X Xu, L Guo, L Ding… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
As the representative density-based clustering algorithm, density peaks clustering (DPC)
has wide recognition, and many improved algorithms and applications have been extended …

Two-client and multi-client functional encryption for set intersection

T van de Kamp, D Stritzl, W Jonker, A Peter - … New Zealand, July 3–5, 2019 …, 2019 - Springer
We propose several functional encryption schemes for set intersection and variants on two
or multiple sets. In these schemes, a party may learn the set intersection from the sets of two …

Element Distinctness and Bounded Input Size in Private Set Intersection and Related Protocols

X Carpent, S Hwang, G Tsudik - International Conference on Applied …, 2024 - Springer
Abstract This paper considers Private Set Intersection (PSI) protocols where one party
(server) imposes a minimum input size (lower bound) on the other party (client), and the …

Towards End-to-End Data Privacy: from Generation to Consumption

S Hwang - 2024 - search.proquest.com
Preserving data privacy is a formidable challenge in today's interconnected and data-centric
world. Individuals are surrounded by “smart” devices that collect and generate massive …

Secure Data Deduplication Schemes

SSM Chow, Y Zhao - Encyclopedia of Cryptography, Security and Privacy, 2022 - Springer
Secure Data Deduplication Schemes Page 1 S Secure Data Deduplication Schemes Sherman
SM Chow1 and Yongjun Zhao2 1Department of Information Engineering, Chinese University of …

Federated Detection of Cross-Site Credential Vulnerabilities and Attacks

KC Wang - 2021 - search.proquest.com
Among the most prominent threats to web accounts today are cross-site credential attacks. A
good example is the theft of a user's password at one website—eg, by a breach of that …

Multi-client functional encryption for controlled data sharing

TR van de Kamp - 2020 - research.utwente.nl
Multi-client functional encryption (MC-FE) is a powerful concept that makes it possible to
compute on confidential data from multiple parties, while only revealing the computational …

[图书][B] Privacy Enhancing Technologies: New Primitives and New Systems

Y Zhao - 2018 - search.proquest.com
Our daily life has now been highly coupled with the Internet. With or without people's
awareness, online activities always leave indelible digital footprints behind. Many Internet …