Multi-party threshold private set intersection with sublinear communication

S Badrinarayanan, P Miao, S Raghuraman… - … Conference on Public …, 2021 - Springer
In multi-party threshold private set intersection (PSI), n parties each with a private set wish to
compute the intersection of their sets if the intersection is sufficiently large. Previously …

Extractors and secret sharing against bounded collusion protocols

E Chattopadhyay, J Goodman, V Goyal… - 2020 IEEE 61st …, 2020 - ieeexplore.ieee.org
In a recent work, Kumar, Meka, and Sahai (FOCS 2019) introduced the notion of bounded
collusion protocols (BCPs). BCPs are multiparty communication protocols in which N parties …

Leakage-resilient secret sharing against colluding parties

A Kumar, R Meka, A Sahai - 2019 IEEE 60th Annual …, 2019 - ieeexplore.ieee.org
In this work, we consider the natural goal of designing secret sharing schemes that ensure
security against an adversary who may learn some “leaked''information about all the shares …

Leakage-resilient secret sharing

A Kumar, R Meka, A Sahai - Cryptology ePrint Archive, 2018 - eprint.iacr.org
In this work, we consider the natural goal of designing secret sharing schemes that ensure
security against a powerful adaptive adversary who may learn some``leaked''information …

A rounds vs. communication tradeoff for multi-party set disjointness

M Braverman, R Oshman - 2017 IEEE 58th Annual Symposium …, 2017 - ieeexplore.ieee.org
In the set disjointess problem, we have k players, each with a private input X i⊆[n], and the
goal is for the players to determine whether or not their sets have a global intersection. The …

The Communication Complexity of Set Intersection Under Product Distributions

R Oshman, T Roth - 50th International Colloquium on Automata …, 2023 - drops.dagstuhl.de
We consider a multiparty setting where k parties have private inputs X_1,…, X_k⊆[n] and
wish to compute the intersection⋂ _ {𝓁= 1}^ k X_𝓁 of their sets, using as little communication …

The communication complexity of multiparty set disjointness under product distributions

N Dershowitz, R Oshman, T Roth - Proceedings of the 53rd Annual ACM …, 2021 - dl.acm.org
In the multiparty number-in-hand set disjointness problem, we have k players, with private
inputs X 1,…, X k⊆[n]. The players' goal is to check whether∩ ℓ= 1 k X ℓ=∅. It is known that …

Multi-Party Set Disjointness and Intersection with Bounded Dependence

M Braverman, R Oshman, T Roth - … of the 43rd ACM Symposium on …, 2024 - dl.acm.org
In the multi-party set disjointness problem, k players receive private inputs in the form of sets
X 1,..., Xk⊆[n], and their goal is to check whether their sets intersect. The set intersection …

Bounded collusion protocols, cylinder-intersection extractors and leakage-resilient secret sharing

A Kumar, R Meka, D Zuckerman - Cryptology ePrint Archive, 2020 - eprint.iacr.org
In this work we study bounded collusion protocols (BCPs) recently introduced in the context
of secret sharing by Kumar, Meka, and Sahai (FOCS 2019). These are multi-party …

Distributed Thresholded Counting with Limited Interaction

X Zhu, Y Tian, Z Huang - Proceedings of the 30th ACM SIGKDD …, 2024 - dl.acm.org
Problems in the area of distributed computing have been extensively studied. In this paper,
we focus on the Distributed Thresholded Counting problem in the coordinator model. In this …