2010
DOI: 10.1007/978-3-642-14423-3_15
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Fuzzy Matching and Intersection on Private Datasets

Abstract: Abstract. At Eurocrypt'04, Freedman, Nissim and Pinkas introduced a fuzzy private matching problem. The problem is defined as follows. Given two parties, each of them having a set of vectors where each vector has T integer components, the fuzzy private matching is to securely test if each vector of one set matches any vector of another set for at least t components where t < T . In the conclusion of their paper, they asked whether it was possible to design a fuzzy private matching protocol without incurring a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…PSI techniques are limited to equality like matching functions, and extensions [12,41] allow for matching rules that require exact match on at least t out of T features. However these techniques achieve poor recall for general matching rules.…”
Section: Private Set Intersection (Psi)mentioning
confidence: 99%
“…PSI techniques are limited to equality like matching functions, and extensions [12,41] allow for matching rules that require exact match on at least t out of T features. However these techniques achieve poor recall for general matching rules.…”
Section: Private Set Intersection (Psi)mentioning
confidence: 99%
“…The protocol is secure under both HBC and malicious models. Recently, improving the efficiency of PSI protocols under malicious attacks becomes the main focus in this field .…”
Section: Related Workmentioning
confidence: 99%
“…[22,29]) and specially fuzzy matching (see e.g. [18,9,31]) is a related area in that protocols for generic fuzzy matching can be viewed as approximate solutions for the above protocols given appropriate mappings that translate "close"enough fingerprints or locations to "similar"-enough strings. However, proposals in this area that focus on more generic distance functions that do not solve our specific problems efficiently since precise appropriate mappings that satisfy the above criterion are not easy to find.…”
Section: Related Workmentioning
confidence: 99%