2014 IEEE International Conference on Cloud Engineering 2014
DOI: 10.1109/ic2e.2014.18
|View full text |Cite
|
Sign up to set email alerts
|

Encrypted Set Intersection Protocol for Outsourced Datasets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
47
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 35 publications
(48 citation statements)
references
References 26 publications
0
47
0
Order By: Relevance
“…When PSI computation is delegated to a server who is not fully trusted, protecting the privacy of the computation input and output from the server is crucial. However, as discussed in section 2 the protocols in [17], [19], [20] do not fully preserve data privacy and leak some information to the cloud server. Protocols like the size-hiding variation of [15], those in [16], [18], O-PSI and EO-PSI offer this protection.…”
Section: Comparisonmentioning
confidence: 99%
See 4 more Smart Citations
“…When PSI computation is delegated to a server who is not fully trusted, protecting the privacy of the computation input and output from the server is crucial. However, as discussed in section 2 the protocols in [17], [19], [20] do not fully preserve data privacy and leak some information to the cloud server. Protocols like the size-hiding variation of [15], those in [16], [18], O-PSI and EO-PSI offer this protection.…”
Section: Comparisonmentioning
confidence: 99%
“…On the other hand, a number of PSI protocols that let clients delegate the computation to a server have been proposed in [15], [16], [17], [18], [19], [20]. The protocols in [17] allow clients to outsource their sets to a server by hashing each element and then adding a random value to it.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations