2020
DOI: 10.1007/s11432-019-9907-x
|View full text |Cite
|
Sign up to set email alerts
|

Intersection-policy private mutual authentication from authorized private set intersection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 38 publications
0
3
0
Order By: Relevance
“…The malicious members are deleted by using a secret sharing algorithm. Wen et al [30] constructed an SH scheme that considers multiple attributes. The proposed scheme can be used in multi-keyword search scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…The malicious members are deleted by using a secret sharing algorithm. Wen et al [30] constructed an SH scheme that considers multiple attributes. The proposed scheme can be used in multi-keyword search scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…The main reason of PSI cardinality has been widely studied is that it has many real applications. Such as, PSI cardinality has been used in privacy preserving data mining 3 , information-sharing 4 , human genome research 5 , national security 6 , Botnet identification 7 , medical data preserving 8 , 9 , social networks 10 , 11 , location privacy protecting 12 , 13 , searchable encryption scheme 14 and anonymous authentication 15 , 16 . In recent years more and more PSI cardinality protocols are proposed, e.g.…”
Section: Introductionmentioning
confidence: 99%
“…It’s hard to improve performance just by scaling up the hardware. The other reason is that the advent of quantum computing, the increasing power of algorithms poses a great challenge to the security of classical cryptography which is based on unconfirmed arduous hypothesis 16 .…”
Section: Introductionmentioning
confidence: 99%