2010
DOI: 10.1007/978-3-642-13013-7_19
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Set Operations in the Presence of Malicious Adversaries

Abstract: Abstract. We revisit the problem of constructing efficient secure twoparty protocols for set-intersection and set-union, focusing on the model of malicious parties. Our main results are constant-round protocols that exhibit linear communication and a linear number of exponentiations with simulation based security. In the heart of these constructions is a technique based on a combination of a perfectly hiding commitment and an oblivious pseudorandom function evaluation protocol. Our protocols readily transform … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
70
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 87 publications
(70 citation statements)
references
References 39 publications
(49 reference statements)
0
70
0
Order By: Relevance
“…We then show that several existing SFE constructions are either commit-first or can be efficiently transformed into one. Examples include variants of Yao's garbled circuit protocol, the oblivious polynomial evaluation of Hazay and Lindell [HL09], the private set intersection protocol of Hazay and Nissim [HN12], and the oblivious automaton evaluation of Gennaro et al [GHS10]. We also show that the GMW compiler [GMW87] outputs a commit-first protocol.…”
Section: Our Contributionmentioning
confidence: 85%
See 3 more Smart Citations
“…We then show that several existing SFE constructions are either commit-first or can be efficiently transformed into one. Examples include variants of Yao's garbled circuit protocol, the oblivious polynomial evaluation of Hazay and Lindell [HL09], the private set intersection protocol of Hazay and Nissim [HN12], and the oblivious automaton evaluation of Gennaro et al [GHS10]. We also show that the GMW compiler [GMW87] outputs a commit-first protocol.…”
Section: Our Contributionmentioning
confidence: 85%
“…Their goal is for one or both parties to learn X ∩Y without revealing additional information about their sets. The PSI problem has been the focus of active research, and to date, many constructions with a variety of efficiency and security properties have been designed and implemented [FNP04,CKT10,HN12,HEK12].…”
Section: Psi Protocol Of Hazay and Nissimmentioning
confidence: 99%
See 2 more Smart Citations
“…A number of organizations dealing with sensitive data such as healthcare providers, insurance companies, law enforcement agencies, and aviation security need to perform such an operation on their data. A large body of work has been studying the design of PSI protocols [11,20,16,18,6,17,9,19,8,1].…”
Section: Our Contributionmentioning
confidence: 99%